Skip to content

Commit f9e1e94

Browse files
authored
Alphabetize IOCs in CrowdStrike article (#6121)
1 parent 53b2b18 commit f9e1e94

File tree

1 file changed

+25
-32
lines changed

1 file changed

+25
-32
lines changed

docs/security/threat-intelligence/sumologic-global-feed-from-crowdstrike.md

Lines changed: 25 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -14,47 +14,40 @@ In partnership with CrowdStrike, Sumo Logic maintains the **_sumo_global_feed_cs
1414
## Indicators of Compromise (IOC)
1515

1616
The following [Indicators of Compromise](https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/indicators-of-compromise-ioc/) types are available from CrowdStrike:
17-
* ip_address
17+
* binary_string
18+
* bitcoin_address
19+
* campaign_id
1820
* domain
19-
* url
21+
* ip_address
2022
* email_address
2123
* event_name
22-
* x509_subject
23-
* ip_address_block
24-
* x509_serial
25-
* binary_string
26-
* service_name
27-
* user_agent
28-
* bitcoin_address
29-
* file_path
30-
* registry
31-
* username
3224
* file_name
33-
* password
34-
* campaign_id
35-
* mutex_name
25+
* file_path
3626
* hash_md5
3727
* hash_sha1
3828
* hash_sha256
29+
* ip_address_block
30+
* mutex_name
31+
* password
32+
* registry
33+
* service_name
34+
* url
35+
* user_agent
36+
* username
37+
* x509_serial
38+
* x509_subject
3939

4040
### Samples for the different IOC types
4141

42-
| IOC Type | IOC |
43-
|---------------|-------------------------------------------------------|
44-
| SHA256 | `6c1bce76f4d2358656132b6b1d471571820688ccdbaca0d86d0ca082b9390536` |
45-
| SHA256 | `b101cd29e18a515753409ae86ce68a4cedbe0d640d385eb24b9bbb69cf8186ae` |
46-
| IP Address | `84.112.91.96` |
47-
| IP Address | `158.69.196.112` |
48-
| File | `updater.exe` |
49-
| File | `0.exe` |
50-
| URL | `http://tycahatit.ru/zapoy/gate.php` |
51-
| URL | `http://ningwitjohnno.ru/zapoy/gate.php` |
52-
| Domain | `9jdco01e.ru` |
53-
| Domain | `ningwitjohnno.ru` |
54-
| Email | `[email protected]` |
55-
| Email | `[email protected]` |
56-
| Hash MD5 | `9da2a54e98ddb9a0adb4ace3dda4d8e0` |
57-
| Hash MD5 | `832efb3fce4b1e16d610d5856f1401bb` |
42+
| IOC type | IOC |
43+
|:--|:--|
44+
| Domain | `9jdco01e.ru`|
45+
| Email | `[email protected]`|
46+
| File | `updater.exe` |
47+
| Hash MD5 | `9da2a54e98ddb9a0adb4ace3dda4d8e0` |
48+
| IP Address | `84.112.91.96` |
49+
| SHA256 | `6c1bce76f4d2358656132b6b1d471571820688ccdbaca0d86d0ca082b9390536`|
50+
| URL | `http://tycahatit.ru/zapoy/gate.php`|
5851

5952
### Expiration of IOCs and threats
6053

@@ -192,7 +185,7 @@ Once an indicator has been marked with a malicious confidence level, it continue
192185
|:-------------------|:----------------------------------------|
193186
| **DomainType** | - DomainType/ActorControlled: It is believed the malicious actor is still in control of this domain.<br/>- DomainType/DGA: Domain is the result of malware utilizing a domain generation algorithm.<br/>- DomainType/DynamicDNS: Domain is owned or used by a dynamic DNS service.<br/>- DomainType/DynamicDNS/Afraid: Domain is owned or used by the Afraid.org dynamic DNS service.<br/>- DomainType/DynamicDNS/DYN: Domain is owned or used by the DYN dynamic DNS service.<br/>- DomainType/DynamicDNS/Hostinger: Domain is owned or used by the Hostinger dynamic DNS service.<br/>- DomainType/DynamicDNS/noIP: Domain is owned or used by the NoIP dynamic DNS service.<br/>- DomainType/DynamicDNS/Oray: Domain is owned or used by the Oray dynamic DNS service.<br/>- DomainType/KnownGood: Domain itself (or the domain portion of a URL) is known to be legitimate, despite having been associated with malware or malicious activity.<br/>- DomainType/LegitimateCompromised: Domain does not typically pose a threat but has been compromised by a malicious actor and may be serving malicious content.<br/>- DomainType/PhishingDomain: Domain has been observed to be part of a phishing campaign.<br/>- DomainType/Sinkholed: Domain is being sinkholed, likely by a security research team. This indicates that, while traffic to the domain likely has a malicious source, the IP address to which it is resolving is controlled by a legitimate third party.<br/>- DomainType/StrategicWebCompromise: Indicates targeted activity, often compromising a legitimate domain used as a watering hole by targeted organizations.<br/>- DomainType/Unregistered: Domain is not currently registered with any registrars. |
194187
| **EmailAddressType** | - EmailAddressType/DomainRegistrant: Email address has been supplied in the registration information for known malicious domains.<br/>- EmailAddressType/SpearphishSender: Email address has been used to send spearphishing emails. |
195-
| | **IntelNews**: The Intel Flash Report ID an indicator is associated with (e.g., IntelNews/NEWS-060520151900). |
188+
| **IntelNews** | The Intel Flash Report ID an indicator is associated with (e.g., IntelNews/NEWS-060520151900). |
196189
| **IPAddressType** | - IPAddressType/HtranDestinationNode: An IP address with this label is being used as a destination address with the HTran Proxy Tool.<br/>- IPAddressType/HtranProxy: An IP address with this label is being used as a relay or proxy node with the HTran Proxy Tool.<br/>- IPAddressType/LegitimateCompromised: It is suspected an IP address with this label is compromised by malicious actors.<br/>- IPAddressType/Parking: IP address is likely being used as a parking IP address.<br/>- IPAddressType/PopularSite: IP address could be utilized for a variety of purposes and may appear more frequently than other IPs.<br/>- IPAddressType/SharedWebHost: IP address may be hosting more than one website.<br/>- IPAddressType/Sinkhole: IP address is likely a sinkhole being operated by a security researcher or vendor.<br/>- IPAddressType/TorProxy: IP address is acting as a TOR (The Onion Router) proxy. |
197190
| **Status** | - Status/ConfirmedActive: Indicator is likely to be currently supporting malicious activity.<br/>- Status/ConfirmedInactive: Indicator is no longer used for malicious purposes. |
198191
| **Target** | The activity associated with this indicator is known to target the indicated vertical sector:<br/>- Aerospace<br/>- Agricultural<br/>- Chemical<br/>- Defense<br/>- Dissident<br/>- Energy<br/>- Extractive<br/>- Financial<br/>- Government<br/>- Healthcare<br/>- Insurance<br/>- InternationalOrganizations<br/>- Legal<br/>- Manufacturing<br/>- Media<br/>- NGO<br/>- Pharmaceutical<br/>- Research<br/>- Retail<br/>- Shipping<br/>- Technology<br/>- Telecom<br/>- Transportation<br/>- Universities |

0 commit comments

Comments
 (0)