Skip to content

Commit f0b3f03

Browse files
committed
Update pattern_type to stix
1 parent 6ac7e23 commit f0b3f03

File tree

2 files changed

+2
-50
lines changed

2 files changed

+2
-50
lines changed

docs/security/threat-intelligence/find-threats.md

Lines changed: 1 addition & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -21,49 +21,7 @@ _index=sec_record*
2121

2222
For syntax and examples, see [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/).
2323

24-
<!-- Add this back once we have support for the cat search operator.
24+
<!-- Add this back once we have support for the cat search operator:
2525
You can also [run threatlookup with the cat search operator](/docs/search/search-query-language/search-operators/threatlookup/#run-threatlookup-with-the-cat-search-operator) to search the entire store of threat intelligence indicators.
2626
-->
2727

28-
## Threatlookup queries in dashboards
29-
30-
The `threatlookup` search operator is used for queries in some dashboards, including [dashboards in the Threat Intel Quick Analysis app](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#viewing-threat-intel-quick-analysis-dashboards). These queries provide great examples of how to use the operator.
31-
32-
To see `threatlookup` used in a query:
33-
1. Open the Threat Intel Quick Analysis app.
34-
1. Navigate to a dashboard, such as **Overview**.
35-
1. Click the three-dot kebab in the upper-right corner of the dashboard panel.
36-
1. Select **Open in Log Search**.
37-
1. Look for `threatlookup` used in the query.
38-
39-
For example, here is the query used for the **Threat Count** panel in the **Threat Intel Quick Analysis - IP** dashboard:
40-
41-
```
42-
_sourceCategory=<source-category-name>
43-
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
44-
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
45-
| count as ip_count by ip_address
46-
47-
| threatlookup singleIndicator ip_address
48-
49-
// normalize confidence level to a string
50-
| if (_threatlookup.confidence >= 85, "high", if (_threatlookup.confidence >= 50, "medium", if (_threatlookup.confidence >= 15, "low", if (_threatlookup.confidence >= 0, "unverified", "unknown")))) as threat_confidence
51-
52-
// filter for threat confidence
53-
| where threat_confidence matches "*"
54-
55-
//rename to match threat_<foo> convention
56-
| %"_threatlookup.actors" as threat_actors
57-
| %"_threatlookup.type" as type
58-
| %"_threatlookup.threat_type" as threat_type
59-
60-
//convert threat valid from to human readable time
61-
| toLong(%"_threatlookup.valid_from" * 1000) as %"_threatlookup.valid_from"
62-
| formatDate(%"_threatlookup.valid_from", "MM-dd-yyyy") as threat_valid_from
63-
64-
| where type matches "ipv4-addr*" and !isNull(threat_confidence)
65-
66-
| if (isEmpty(threat_actors), "Unassigned", threat_actors) as threat_actors
67-
68-
|sum (ip_count) as threat_count
69-
```

docs/security/threat-intelligence/upload-formats.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -332,11 +332,5 @@ The following attributes are required:
332332
* `url:value`. URL. (Entity type in Cloud SIEM is `_url`.)
333333
* `user-account:user-id`. User ID. (Entity type in Cloud SIEM is `_username`.)
334334
* `user-account:login`. Login name. (Entity type in Cloud SIEM is `_username`.)
335-
* **pattern_type** (string). The pattern language used in this indicator (as defined by [pattern_type in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_9lfdvxnyofxw)). Following are valid values:
336-
* `stix`. Specifies the [STIX](https://oasis-open.github.io/cti-documentation/stix/intro) pattern language.
337-
* `pcre`. Specifies the [PCRE](https://www.pcre.org/) language.
338-
* `sigma`. Specifies the [SIGMA](https://sigmahq.io/) language.
339-
* `snort`. Specifies the [SNORT](https://www.snort.org/) language.
340-
* `suricata`. Specifies the [SURICATA](https://suricata-ids.org/) language.
341-
* `yara`. Specifies the [YARA](https://virustotal.github.io/yara/) language.
335+
* **pattern_type** (string). The pattern language used in this indicator (as defined by [pattern_type in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_9lfdvxnyofxw)). Enter `stix` to specify the [STIX](https://oasis-open.github.io/cti-documentation/stix/intro) pattern language.
342336
* **valid_from** (string [date-time]). Beginning time this indicator is valid. Timestamp in UTC in RFC3339 format. For example, `2023-03-21T12:00:00.000Z`.

0 commit comments

Comments
 (0)