Skip to content

Commit

Permalink
Merge pull request #1704 from Sengthay/retrohunt-doc/fix_some_mapping
Browse files Browse the repository at this point in the history
Add missing field 'dns.question.registered_domain' and 'ipv6-addr'. Improve fields related to 'x509'
  • Loading branch information
ka0ula authored Mar 29, 2024
2 parents 263dcb4 + 0de8010 commit 74ecdc5
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
Binary file modified docs/assets/operation_center/rules_catalog/verified_iocs.gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
12 changes: 6 additions & 6 deletions docs/xdr/features/detect/iocdetection.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@

IOC detection is a critical mechanism in detecting attacks that are trying to harm your system or have already breached it. The Sekoia SOC platform is powered by our Threat Detection & Research (TDR) team, which constantly enriches our IOC database with its state-of-the-art investigations and extensive expertise in Intelligence.

With IOC detection, all future and past events are verified automatically to ensure you anticipate, detect, and neutralize threats.
With IOC detection, you can automatically identify potential threats in your past and future events by monitoring active IOCs.

## How does IOC detection at Sekoia work?

Sekoia Threat Detection & Research (TDR) team maintains the CTI database with millions of IOCs through their investigation and dedicated expertise.
All this incredible work benefits Sekoia XDR clients, who can consult the number of IOCs available on the Rules catalog page.
All this incredible work benefits Sekoia XDR clients, who can consult the number of IOCs available on the Rules catalog page in the section `Active IOCs`.

![verified iocs](/assets/operation_center/rules_catalog/verified_iocs.gif){: style="max-width:100%"}

Expand Down Expand Up @@ -57,13 +57,13 @@ The tables below list the ECS event fields that are verified by IOC detection.

| STIX path | ECS event field |
| --- | --- |
| domain-name:value | client.domain<br>client.registered_domain<br>destination.domain<br>destination.registered_domain<br>dns.question.name<br>source.domain<br>source.registered_domain<br>server.domain<br>server.registered_domain<br>tls.client.x509.alternative_names<br>url.domain<br>x509.alternative_names<br>x509.subject.common_name |
| domain-name:value | client.domain<br>client.registered_domain<br>destination.domain<br>destination.registered_domain<br>dns.question.name<br>dns.question.registered_domain<br>server.domain<br>server.registered_domain<br>source.domain<br>source.registered_domain<br>tls.[*client/server*].x509.alternative_names<br>tls.[*client/server*].x509.subject.common_name<br>url.domain<br>url.registered_domain |

#### Observable type: Email Address

| STIX path | ECS event field |
| --- | --- |
| email-addr:value| client.user.email<br>destination.user.email<br>destination.user.full_name<br>email.from.address<br>email.sender.address<br>email.to.address<br>email.cc.address<br>email.bcc.address<br>file.x509.alternative_names<brhost.user.email><br>server.user.email<br>source.user.email<br>source.user.full_name<br>tls.client.x509.alternative_names<br>user.email<br>user.effective.email<br>user.target.email |
| email-addr:value| client.user.email<br>destination.user.email<br>destination.user.full_name<br>email.from.address<br>email.sender.address<br>email.to.address<br>email.cc.address<br>email.bcc.address<br>file.x509.alternative_names<brhost.user.email><br>server.user.email<br>source.user.email<br>source.user.full_name<br>user.email<br>user.effective.email<br>user.target.email<br>tls.[*client/server*].x509.alternative_names |
| email-addr:display_name | destination.user.full_name<br>source.user.full_name |

#### Observable type: File
Expand All @@ -85,7 +85,7 @@ The tables below list the ECS event fields that are verified by IOC detection.

| STIX path | ECS event field |
| --- | --- |
| ipv4-addr:value | client.ip<br>destination.ip<br>host.ip<br>server.ip<br>source.ip |
| ipv4-addr:value<br>ipv6-addr:value | client.ip<br>destination.ip<br>host.ip<br>server.ip<br>source.ip |

#### Observable type: Network Traffic

Expand Down Expand Up @@ -121,4 +121,4 @@ The tables below list the ECS event fields that are verified by IOC detection.
| x509-certificate:subject_public_key_algorithm | x509.public_key_algorithm |
| x509-certificate:subject_public_key_exponent | x509.public_key_exponent |
| x509-certificate:validity_not_before | x509.not_before |
| x509-certificate:validity_not_after | x509.not_after |
| x509-certificate:validity_not_after | x509.not_after |

0 comments on commit 74ecdc5

Please sign in to comment.