You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/integrations/security-threat-detection/threat-intel-quick-analysis.md
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -267,12 +267,11 @@ You can further investigate bad IP triggers by updating your query to check the
267
267
**Description:** Indicates a confidence level by which an indicator is considered to be malicious. For example, a malicious file hash may always have a value of high while domains and IP addresses will very likely change over time. The malicious confidence level is also represented under the labels list in the JSON data structure.<br/>
268
268
Once an indicator has been marked with a malicious confidence level, it continues to have that confidence level value until updated by CrowdStrike. If you think there is a false positive, please file a Support ticket, and we'll work with CrowdStrike to investigate the IOC in question and update the threat details.<br/>
269
269
**Values:**
270
-
271
-
* high
272
-
* medium
273
-
* low
274
-
* unverified—This indicator has not been verified by a CrowdStrike Intelligence analyst or an automated system.
275
-
* null—Indicates that Sumo Logic has no information about the threat record.
270
+
* high
271
+
* medium
272
+
* low
273
+
* unverified—This indicator has not been verified by a CrowdStrike Intelligence analyst or an automated system.
274
+
* null—Indicates that Sumo Logic has no information about the threat record.
276
275
277
276
---
278
277
#### `published_date`
@@ -298,13 +297,13 @@ Once an indicator has been marked with a malicious confidence level, it continue
298
297
**Data Type:** string<br/>
299
298
**Description:** The point in the kill chain at which an indicator is associated. The kill chain list is also represented under the labels list in the JSON data structure.<br/>
300
299
**Values:**
301
-
* reconnaissance—This indicator is associated with the research, identification, and selection of targets by a malicious actor.
302
-
* weaponization—This indicator is associated with assisting a malicious actor create malicious content.
303
-
* delivery—This indicator is associated with the delivery of an exploit or malicious payload.
304
-
* exploitation—This indicator is associated with the exploitation of a target system or environment.
305
-
* installation—This indicator is associated with the installation or infection of a target system with a remote access tool or other tool allowing for persistence in the target environment.
306
-
* c2 (Command and Control)—This indicator is associated with malicious actor command and control.
307
-
* actionOnObjectives—This indicator is associated with a malicious actor's desired effects and goals.
300
+
* reconnaissance—This indicator is associated with the research, identification, and selection of targets by a malicious actor.
301
+
* weaponization—This indicator is associated with assisting a malicious actor create malicious content.
302
+
* delivery—This indicator is associated with the delivery of an exploit or malicious payload.
303
+
* exploitation—This indicator is associated with the exploitation of a target system or environment.
304
+
* installation—This indicator is associated with the installation or infection of a target system with a remote access tool or other tool allowing for persistence in the target environment.
305
+
* c2 (Command and Control)—This indicator is associated with malicious actor command and control.
306
+
* actionOnObjectives—This indicator is associated with a malicious actor's desired effects and goals.
0 commit comments