IOC geolocation |
Location of client IP addresses present in IOC. Note - location of
client IP does not always correlate with actual physical location
of user or system
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict=true, confidenceThreshold=?threshold)
| worldMap(ip=client_ip)
| World Map |
Threat trends |
Number of client IP IOC matches by confidence threshold over time
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict="true", confidenceThreshold=?threshold)
| split("ioc")
| rename(field="ioc.malicious_confidence", as="iocmc")
| timechart(iocmc)
| Time Chart |
Threat types |
Pie chart showing breakdown of threat types (linked to client IP)
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict=true, confidenceThreshold=?threshold)
| split("ioc")
| splitString(field="ioc.labels", by=",", as="ioc.labels")
| split("ioc.labels")
| regex(field="ioc.labels", regex="(^ThreatType\\/(?<value>.+)$)")
| groupBy(value)
| Pie Chart |
Threat relationships |
Links client IP IOC labels to the different values of each label
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict=true, confidenceThreshold=?threshold)
| split("ioc")
| splitString(field="ioc.labels", by=",", as="ioc.labels")
| split("ioc.labels")
| regex(field="ioc.labels", regex="(?<category>^[^\/]+)\/(?<value>.+)$")
| sankey(source="category",target="value") // threat relationships
| Sankey |
Actors |
Pie chart showing breakdown of threat actors (linked to client IP)
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict=true, confidenceThreshold=?threshold)
| split("ioc")
| splitString(field="ioc.labels", by=",", as="ioc.labels")
| split("ioc.labels")
| regex(field="ioc.labels", regex="(^Actor\\/(?<value>.+)$)")
| groupBy(value)
| Pie Chart |
Kill chains |
Pie chart showing breakdown of kill chain values (linked to client
IP)
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict=true, confidenceThreshold=?threshold)
| split("ioc")
| splitString(field="ioc.labels", by=",", as="ioc.labels")
| split("ioc.labels")
| regex(field="ioc.labels", regex="(^KillChain\\/(?<value>.+)$)")
| groupBy(value)
| Pie Chart |
All threat details |
Detailed information of all threats found in client IPs
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict=true, confidenceThreshold=?threshold)
| split("ioc")
| "ioc.malicious_confidence" match {
unverified => icon := "\u2139 " ;
low => icon := "\u2B07 " ;
medium => icon := "\u26A0 " ;
high => icon := "\u2757 " ;
* => icon := " " ;
} // icons to display for each malicious confidence
| concat(["icon", "ioc.malicious_confidence"], as="ioc.malicious_confidence")
| now := now()
| ioc_age := now - ioc.last_updated
| formatDuration(ioc_age, precision=2, as="ioc.age")
| groupBy(["ip_addr_IOC", "#repo", "ioc.type", "ioc.indicator", "ioc.malicious_confidence", "ioc.published_date", "ioc.last_updated", "ioc.age", "ioc.labels"])
| formatTime(field="ioc.published_date", as="ioc.published_date", format="%Y-%m-%d %H:%M:%S")
| formatTime(field="ioc.last_updated", as="ioc.last_updated", format="%Y-%m-%d %H:%M:%S")
| Table |
Malware |
Pie chart showing breakdown of malware types (linked to client IP)
Hide Query Show Query #logtype = "apache-access-log" or #logtype = "apache-error-log"
| ioc:lookup(["client_ip"], type="ip_address", strict=true, confidenceThreshold=?threshold)
| split("ioc")
| splitString(field="ioc.labels", by=",", as="ioc.labels")
| split("ioc.labels")
| regex(field="ioc.labels", regex="(^Malware\\/(?<value>.+)$)")
| groupBy(value)
| Pie Chart |
note-1624965575450 |
# All Details The table below shows details of all the threats
found, irrespective of the threshold filter applied. Click on the
various aspects of these results to drill down into the raw events
| Note |
Introduction to indicators of compromise (IOC) dashboard |
Falcon LogScale includes an integration with CrowdStrike's Falcon
Intelligence to provide Falcon LogScale customers with a built-in
database of Indicators of Compromise (IOCs). Customers can search
their logs for matches against the IOC database and see relevant
threat information for each IOC found.
Find
out more. This dashboard takes the
client_ip field from both
Apache access and error logs and checks it against known IP
addresses in the IOC database with the
ioc:lookup() function.
| Note |