You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn about mapping of threat intelligence indicators to Sumo Logic.
4
+
sidebar_label: Mapping
5
+
description: Learn about the mapping of threat intelligence schema from vendor sources to Sumo Logic schema.
6
6
---
7
7
8
8
import useBaseUrl from '@docusaurus/useBaseUrl';
9
9
10
-
## _sumo_global_feed_cs mapping
10
+
Schema from vendor-supplied threat intelligence indicators are mapped to normalized values in the Sumo Logic threat intelligence datastore to provide ease of interoperability. The mapping is described in this article.
11
11
12
-
Sumo Logic provides an out-of-the-box a `_sumo_global_feed_cs` source of threat intelligence indicators supplied by CrowdStrike. You can see it in the [**Threat Intelligence** tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#threat-intelligence-tab). This source is a default source and cannot be changed or deleted.
12
+
## CrowdStrike
13
13
14
-
In the threat intelligence datastore, the schema is mapped to normalized values to provide ease of interoperability with the schema from other threat intelligence sources:
14
+
You can ingest threat indicators from CrowdStrike using the [CrowdStrike Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source). In addition, Sumo Logic provides an out-of-the-box `_sumo_global_feed_cs` source whose indicators are supplied by CrowdStrike. The same normalization applies to schema in both sources.
15
15
16
-
| Original schema | Normalized schema in the datastore |
17
-
|:--|:--|
18
-
|`actor`|`actors`|
19
-
|`id`|`id`|
20
-
|`indicator`|`indicator`|
21
-
|`kill_chain_phases`|`killChain`|
22
-
|`labels.ThreatType`|`threatType`|
23
-
|`last_updated`|`updated`|
24
-
|`malicious_confidence`|`confidence` (normalized to the 0-100 scale) |
25
-
|`published_date`|`validFrom` and `imported`|
26
-
|`type`|`type`|
16
+
Following are the normalized values for CrowdStrike:
17
+
18
+
| CrowdStrike schema | Normalized schema in the datastore | Notes |
19
+
|:--|:--|:--|
20
+
|`actor`|`actors`| Array joined with a comma: ", " |
21
+
|`id`|`id`| Array joined with a comma: ", " |
22
+
|`indicator`|`indicator`||
23
+
|`kill_chain_phases`|`killChain`||
24
+
|`labels.ThreatType`|`threatType`*||
25
+
|`last_updated`|`updated`||
26
+
|`malicious_confidence`|`confidence`| Normalized to a 0-100 scale. |
27
+
|`published_date`|`validFrom` and `imported`||
28
+
|`type`|`type`||
29
+
30
+
All other fields will be kept in the `fields{}` object.
27
31
28
-
(All other fields will be kept in the `fields{}` object.)
32
+
*The value `malicious-activity` is used for the `threatType` if the regex matches: `name=threattype\/(clickfraud|commodity|pointofsale|randomware|targeted|targetedcrimeware)`. The value `anomalous-activity` is used if the regex matches `name=threattype\/`, and the value `unknown` is used if nothing matches.
29
33
30
-
### Type mapping for _sumo_global_feed_cs
34
+
### Type mapping for CrowdStrike
31
35
32
36
The `type` object is mapped to the following normalized type values:
33
37
34
-
| Original type | Normalized type in the datastore |
38
+
| Original type in CrowdStrike | Normalized type in the datastore |
35
39
|:--|:--|
36
40
|`binary_string`|`artifact:payload_bin`|
37
41
|`bitcoin_address`|`url`|
@@ -50,42 +54,25 @@ The `type` object is mapped to the following normalized type values:
You can ingest threat indicators from CrowdStrike using the [CrowdStrike Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source).
59
+
You can ingest threat indicators from Intel 471 using the [Intel 471 Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/intel471-threat-intel-source/). In addition, Sumo Logic provides an out-of-the-box `SumoLogic_ThreatIntel` source whose indicators are supplied by Intel 471. The same normalization applies to schema in both sources.
57
60
58
-
In the threat intelligence datastore, the CrowdStrike schema is mapped to normalized values to provide ease of interoperability with the schema from other threat intelligence sources:
61
+
Following are the normalized values for Intel 471:
59
62
60
-
| CrowdStrike schema | Normalized schema in the datastore | Notes |
61
-
|:--|:--|:--|
62
-
|`[]actors`|`actors`| Array joined with a ", " |
63
-
|`id`|`id`| Array joined with a ", " |
64
-
|`indicator`|`indicator`||
65
-
|`[]kill_chains`|`killChain`||
66
-
|`labels`|`threatType`| Value used can also be `malicious-activity`, `anomalous-activity`, or `unknown`.*|
67
-
68
-
*Value `malicious-activity` used if regex matches: `name=threattype\/(clickfraud|commodity|pointofsale|randomware|targeted|targetedcrimeware)` <br/>Value `anomalous-activity` used if regex matches: `name=threattype\/` <br/>Value `unknown` used if nothing matches.
69
-
70
-
## Intel471 mapping
71
-
72
-
You can ingest threat indicators from Intel471 using the [Intel471 Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/intel471-threat-intel-source/).
73
-
74
-
In the threat intelligence datastore, the Intel471 schema is mapped to normalized values to provide ease of interoperability with the schema from other threat intelligence sources:
75
-
76
-
| ThreatIntel 471 schema | Normalized schema in the datastore | Notes |
63
+
| Intel 471 schema | Normalized schema in the datastore | Notes |
77
64
|:--|:--|:--|
78
65
|`activity.last`|`validFrom`| Converted from epoch timestamp. |
79
66
|`data.expiration`|`validUntil`| Converted from epoch timestamp. |
80
67
|`data.mitre_tactics`|`killChain`||
81
68
|`data.threat.uid`|`id`||
82
69
||`threatType`| Statically set to `unknown`. |
83
70
84
-
## Mandiant mapping
71
+
## Mandiant
85
72
86
73
You can ingest threat indicators from Mandiant using the [Mandiant Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/mandiant-threat-intel-source/).
87
74
88
-
In the threat intelligence datastore, the Mandiant schema is mapped to normalized values to provide ease of interoperability with the schema from other threat intelligence sources:
75
+
Following are the normalized values for Mandiant:
89
76
90
77
| Mandiant schema | Normalized schema in the datastore | Notes |
91
78
|:--|:--|:--|
@@ -95,13 +82,13 @@ In the threat intelligence datastore, the Mandiant schema is mapped to normalize
95
82
|`unknown`|`threatType`||
96
83
|`value`|`indicator`||
97
84
98
-
## ZeroFox mapping
85
+
## ZeroFox
99
86
100
87
You can ingest threat indicators from ZeroFox using the [ZeroFox Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zerofox-intel-source/).
101
88
102
-
In the threat intelligence datastore, the ZeroFox schema is mapped to normalized values to provide ease of interoperability with the schema from other threat intelligence sources:
89
+
Following are the normalized values for ZeroFox:
103
90
104
-
|Mandiant schema | Normalized schema in the datastore | Notes |
91
+
|ZeroFox schema | Normalized schema in the datastore | Notes |
105
92
|:--|:--|:--|
106
93
|`c2_domain`|`indicator`||
107
94
|`c2_ip_address`|`indicator`||
@@ -134,22 +121,6 @@ In the threat intelligence datastore, the ZeroFox schema is mapped to normalized
134
121
|`url--{{url}}`|`id`||
135
122
||`threatType`| Set to `compromised`. |
136
123
137
-
### Confidence mapping for ZeroFox
138
-
139
-
The `confidence` field in the datastore has the following values for ZeroFox:
140
-
141
-
| ZeroFox item | Confidence score in datastore |
142
-
|:--|:--|
143
-
|`domain`|`50`|
144
-
|`ip`|`50`|
145
-
|`ip_address`|`50`|
146
-
|`ip_addresses`|`50`|
147
-
|`md5`|`75`|
148
-
|`sha1`|`75`|
149
-
|`sha256`|`75`|
150
-
|`sha512`|`75`|
151
-
|`url`|`50` for phishing events, and `100` for disruption events |
152
-
153
124
### Type mapping for ZeroFox
154
125
155
126
The `type` object is mapped to the following normalized type values:
@@ -164,4 +135,18 @@ The `type` object is mapped to the following normalized type values:
164
135
|`Ip_addresses`|`ipv4-addr` or `ipv6-addr`|
165
136
|`url`|`url`|
166
137
138
+
### Confidence mapping for ZeroFox
139
+
140
+
The `confidence` field in the datastore has the following values for ZeroFox:
167
141
142
+
| ZeroFox item | Confidence score in datastore |
143
+
|:--|:--|
144
+
|`domain`|`50`|
145
+
|`ip`|`50`|
146
+
|`ip_address`|`50`|
147
+
|`ip_addresses`|`50`|
148
+
|`md5`|`75`|
149
+
|`sha1`|`75`|
150
+
|`sha256`|`75`|
151
+
|`sha512`|`75`|
152
+
|`url`|`50` for phishing events, and `100` for disruption events |
0 commit comments