Skip to content

Commit c75856d

Browse files
committed
Merge branch 'V1-to-V2-apps-migration' of https://github.com/SumoLogic/sumologic-documentation into V1-to-V2-apps-migration
2 parents 99df797 + cae26d3 commit c75856d

File tree

1 file changed

+12
-13
lines changed

1 file changed

+12
-13
lines changed

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -267,12 +267,11 @@ You can further investigate bad IP triggers by updating your query to check the
267267
**Description:** Indicates a confidence level by which an indicator is considered to be malicious. For example, a malicious file hash may always have a value of high while domains and IP addresses will very likely change over time. The malicious confidence level is also represented under the labels list in the JSON data structure.<br/>
268268
Once an indicator has been marked with a malicious confidence level, it continues to have that confidence level value until updated by CrowdStrike. If you think there is a false positive, please file a Support ticket, and we'll work with CrowdStrike to investigate the IOC in question and update the threat details.<br/>
269269
**Values:**
270-
271-
* high
272-
* medium
273-
* low
274-
* unverified—This indicator has not been verified by a CrowdStrike Intelligence analyst or an automated system.
275-
* null—Indicates that Sumo Logic has no information about the threat record.
270+
* high
271+
* medium
272+
* low
273+
* unverified—This indicator has not been verified by a CrowdStrike Intelligence analyst or an automated system.
274+
* null—Indicates that Sumo Logic has no information about the threat record.
276275
277276
---
278277
#### `published_date`
@@ -298,13 +297,13 @@ Once an indicator has been marked with a malicious confidence level, it continue
298297
**Data Type:** string<br/>
299298
**Description:** The point in the kill chain at which an indicator is associated. The kill chain list is also represented under the labels list in the JSON data structure.<br/>
300299
**Values:**
301-
* reconnaissance—This indicator is associated with the research, identification, and selection of targets by a malicious actor.
302-
* weaponization—This indicator is associated with assisting a malicious actor create malicious content.
303-
* delivery—This indicator is associated with the delivery of an exploit or malicious payload.
304-
* exploitation—This indicator is associated with the exploitation of a target system or environment.
305-
* installation—This indicator is associated with the installation or infection of a target system with a remote access tool or other tool allowing for persistence in the target environment.
306-
* c2 (Command and Control)—This indicator is associated with malicious actor command and control.
307-
* actionOnObjectives—This indicator is associated with a malicious actor's desired effects and goals.
300+
* reconnaissance—This indicator is associated with the research, identification, and selection of targets by a malicious actor.
301+
* weaponization—This indicator is associated with assisting a malicious actor create malicious content.
302+
* delivery—This indicator is associated with the delivery of an exploit or malicious payload.
303+
* exploitation—This indicator is associated with the exploitation of a target system or environment.
304+
* installation—This indicator is associated with the installation or infection of a target system with a remote access tool or other tool allowing for persistence in the target environment.
305+
* c2 (Command and Control)—This indicator is associated with malicious actor command and control.
306+
* actionOnObjectives—This indicator is associated with a malicious actor's desired effects and goals.
308307
309308
---
310309
#### `labels`

0 commit comments

Comments
 (0)