We are trying to ingest a STIX file into the Threat Intelligence Management, the STIX parses, but does not find anything of interest in the file. the _internal index has the message 'status="No observables or indicators found in file"' The STIX file has the format below (which from what I can tell is a valid format, containing indicators {
"more": false,
"objects": [
{
"confidence": "70",
"created": "2023-09-08T00:02:39.000Z",
"description": "xxxxxxxxx",
"id": "xxxxxxx",
"modified": "2023-09-08T00:02:39.000Z",
"name": "xxxxxxx",
"pattern": "[ipv4-addr:value = '101.38.159.17']",
"spec_version": "2.1",
"type": "indicator",
"valid_from": "2023-09-08T00:02:39.000Z",
"valid_until": "2025-11-07T00:02:39.000Z"
},
...... Has anyone had any success with STIX files and be able to share the basic format of what worked for them? Or anyone have anything other to suggest? Many thanks Simon Splunk Enterprise Security
... View more