Query indicators - How to query indicators in the threat intel library - Threat Intel Management Guide - Administrator Guide - Cortex XSIAM - Cortex - Security Operations

Cortex XSIAM Documentation

Product
Cortex XSIAM
Creation date
2024-03-06
Last date published
2025-12-14
Category
Administrator Guide
Abstract

How to query indicators in the threat intel library

You can access threat intel data through the following methods:

  • On the XSIAM Indicators page, select an indicator to start investigating.

  • When investigating an incident, select an extracted indicator. The Quick View shows basic information about the indicator in Cortex XSIAM. Full view shows the full Cortex XSIAM indicator summary.

  • On the XSIAM Indicators page, query an indicator.

    The Threat Intel library is a centralized space for all indicators, whether they are found in an incident, brought in as a feed, or added manually. You can view in-depth information on collected indicators and filter the library based on common attributes.

    Note

    You can search or look up indicators. A search, which can include wildcards and complex queries, can return multiple results. Lookups are exact values and can only return one result.

Indicator query fields

You can search for indicators using any of the available search fields. This is a partial list of the available search fields.

Field

Description

type

The type of the indicator, such as File or Email.

verdict

The reputation of the indicator:

  • Malicious

  • Suspicious

  • Benign

  • Unknown

aggregatedReliability

Searches for indicators based on a reliability score such as A - Completely reliable.

sourceBrands

Indicator feed or enrichment integrations.

sourceInstances

A specific instance of an indicator feed or enrichment integration.

expirationSource

The source (such as script or manual.) that last sets the indicator's expiration status.

tags

Tags applied to indicators.

comments

Search for keywords within indicators’ comments.

You can use a wildcard query, which finds indicators containing terms that match the specified wildcard. For example, the * pattern matches any sequence of 0 or more characters, and ? matches any single character. For a regex query, use the following value:

"/.*\\?.*/"