You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/security/threat-intelligence/find-threats.md
+1-43Lines changed: 1 addition & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,49 +21,7 @@ _index=sec_record*
21
21
22
22
For syntax and examples, see [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/).
23
23
24
-
<!-- Add this back once we have support for the cat search operator.
24
+
<!-- Add this back once we have support for the cat search operator:
25
25
You can also [run threatlookup with the cat search operator](/docs/search/search-query-language/search-operators/threatlookup/#run-threatlookup-with-the-cat-search-operator) to search the entire store of threat intelligence indicators.
26
26
-->
27
27
28
-
## Threatlookup queries in dashboards
29
-
30
-
The `threatlookup` search operator is used for queries in some dashboards, including [dashboards in the Threat Intel Quick Analysis app](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#viewing-threat-intel-quick-analysis-dashboards). These queries provide great examples of how to use the operator.
31
-
32
-
To see `threatlookup` used in a query:
33
-
1. Open the Threat Intel Quick Analysis app.
34
-
1. Navigate to a dashboard, such as **Overview**.
35
-
1. Click the three-dot kebab in the upper-right corner of the dashboard panel.
36
-
1. Select **Open in Log Search**.
37
-
1. Look for `threatlookup` used in the query.
38
-
39
-
For example, here is the query used for the **Threat Count** panel in the **Threat Intel Quick Analysis - IP** dashboard:
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
45
-
| count as ip_count by ip_address
46
-
47
-
| threatlookup singleIndicator ip_address
48
-
49
-
// normalize confidence level to a string
50
-
| if (_threatlookup.confidence >= 85, "high", if (_threatlookup.confidence >= 50, "medium", if (_threatlookup.confidence >= 15, "low", if (_threatlookup.confidence >= 0, "unverified", "unknown")))) as threat_confidence
51
-
52
-
// filter for threat confidence
53
-
| where threat_confidence matches "*"
54
-
55
-
//rename to match threat_<foo> convention
56
-
| %"_threatlookup.actors" as threat_actors
57
-
| %"_threatlookup.type" as type
58
-
| %"_threatlookup.threat_type" as threat_type
59
-
60
-
//convert threat valid from to human readable time
61
-
| toLong(%"_threatlookup.valid_from" * 1000) as %"_threatlookup.valid_from"
62
-
| formatDate(%"_threatlookup.valid_from", "MM-dd-yyyy") as threat_valid_from
63
-
64
-
| where type matches "ipv4-addr*" and !isNull(threat_confidence)
65
-
66
-
| if (isEmpty(threat_actors), "Unassigned", threat_actors) as threat_actors
Copy file name to clipboardExpand all lines: docs/security/threat-intelligence/upload-formats.md
+1-7Lines changed: 1 addition & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -332,11 +332,5 @@ The following attributes are required:
332
332
* `url:value`. URL. (Entity type in Cloud SIEM is `_url`.)
333
333
* `user-account:user-id`. User ID. (Entity type in Cloud SIEM is `_username`.)
334
334
* `user-account:login`. Login name. (Entity type in Cloud SIEM is `_username`.)
335
-
* **pattern_type** (string). The pattern language used in this indicator (as defined by [pattern_type in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_9lfdvxnyofxw)). Following are valid values:
336
-
* `stix`. Specifies the [STIX](https://oasis-open.github.io/cti-documentation/stix/intro) pattern language.
337
-
* `pcre`. Specifies the [PCRE](https://www.pcre.org/) language.
338
-
* `sigma`. Specifies the [SIGMA](https://sigmahq.io/) language.
339
-
* `snort`. Specifies the [SNORT](https://www.snort.org/) language.
340
-
* `suricata`. Specifies the [SURICATA](https://suricata-ids.org/) language.
341
-
* `yara`. Specifies the [YARA](https://virustotal.github.io/yara/) language.
335
+
* **pattern_type** (string). The pattern language used in this indicator (as defined by [pattern_type in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_9lfdvxnyofxw)). Enter `stix` to specify the [STIX](https://oasis-open.github.io/cti-documentation/stix/intro) pattern language.
342
336
* **valid_from** (string [date-time]). Beginning time this indicator is valid. Timestamp in UTC in RFC3339 format. For example, `2023-03-21T12:00:00.000Z`.
0 commit comments