Creating Indicators
  • 11 Jan 2026
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Creating Indicators

  • Dark
    Light
  • PDF

Article summary

Overview

An Indicator represents an atomic piece of information that has some intelligence value within the ThreatConnect® Diamond Model. Indicators are unique within an owner. For example, an Organization can have only one copy of the Host Indicator bad.com.

You can create individual Indicators in your ThreatConnect owners using the + Create & Import option on the Search: Indicators screen.

Before You Start

User Roles

  • To create Indicators in an Organization, your user account must have an Organization role of Standard User, Sharing User, Organization Administrator, or App Developer.
  • To create Indicators in a Community or Source, your user account must have a Community role of Contributor, Editor, or Director for that Community or Source.

Creating an Indicator

Follow these steps to create an Indicator:

  1. From the Search & Create dropdown on the top navigation bar, select Indicators.
  2. Click + Create & Import at the upper right of the Search: Indicators screen.
  3. Select Create, and then select an Indicator type.
  4. On the Create window, do the following:
    1. Select the owner in which to create the Indicator.
    2. Enter the Indicator’s value(s).
    3. Click SAVE to create the Indicator.
      Note
      Each owner can have only one copy of a given Indicator. If you try to create an Indicator that already exists in the selected owner, the Details screen for the existing Indicator will open after you click SAVE on the Create window.

The name and appearance of the Create window depend on the Indicator type you select from the + Create & Import menu. See the “Available Options When Creating Indicators” section for a list of options available in the Create window for each Indicator type.

Available Options When Creating Indicators

See Table 1 for a description of each option available in the Create window for each Indicator type.

 

Field NameDescriptionRequired?
Address
IP AddressEnter a valid IP address, either IPv4 or IPv6.
Example
192.168.0.1
Note
For IPv6, ThreatConnect supports standard (e.g., 1762:0:0:0:0:B03:1:AF18), “exploded” standard (e.g., 1762:0000:0000:0000:0000:0B03:0001:AF18), and compressed (e.g., 1762::B03:1:AF18) representations. Mixed notation (e.g., 1762:0:0:0:0:B03:127.32.67.15) is not supported.
Required
ASN
AS NumberEnter an ASN (Autonomous System Number) that uniquely identifies each network on the Internet.
Example
ASN204288
Required
CIDR
BlockEnter a block of network IP addresses.
Example
10.10.1.16/32
Required
Email Address
E-mail AddressEnter a valid email address.
Example
badguy@bad.com
Required
Email Subject
SubjectEnter the subject line of an email.
Example
FINAL WARNING: Mailbox Update Notice!!
Required
File
MD5Enter a valid MD5 file hash.
Example
D852C3D06EF63EA6C6A21B0D1CDF14D4
At least one valid file hash (MD5, SHA1, or SHA256) is required
SHA1Enter a valid SHA1 file hash.
Example
3351A8E25E471E4704628E990525CEED1D79791B
At least one valid file hash (MD5, SHA1, or SHA256) is required
SHA256Enter a valid SHA256 file hash.
Example
9974B4BEFA2906A6925E786C47651319ED70E3B9FE1F76E25AE0EF81F6555996
At least one valid file hash (MD5, SHA1, or SHA256) is required
Hashtag
HashtagEnter a hashtag term used in social media.
Example
#apt
Required
Host
Host NameEnter a valid hostname or domain.
Example
bad.com
Required
DNS Resolution ActiveSelect this checkbox to turn on DNS resolution tracking for the Host Indicator.Optional
Whois ActiveSelect this checkbox to turn on the WHOIS feature for the Host Indicator.Optional
Mutex
MutexEnter a synchronization primitive that can be used to identify malware files and relate malware families.
Example
\Sessions\1\BaseNamedObjects\Globa\CLR_PerfMon_WrapMutex
Required
Registry Key
Key NameEnter a node in a hierarchical database (i.e., key) that contains data critical for the operation of Windows® and the applications and services that run on Windows.
Example
HKEY_CURRENT_USER\Software\CurrentVersion\Policies\System
Required
Value NameEnter a registry value associated with the specified registry key.
Example
disabletaskmgr
Optional
Value TypeSelect the registry value type.
Example
REG_DWORD
Required
URL
URLEnter a valid URL, including protocol.
Example
http://www.bad.com/index.php?id=1
Note
URLs are accepted according to RFC 3986, with a few exceptions: Underscore (_) is an allowed character for the third label (i.e., subdomains); the host section of the authority part must be lowercase; URL encoding is not verified (% is simply an accepted character in the path, query, and fragment); and user information must be removed from the authority part. Accepted schemes are http, https, ftp, and sftp. The host section of the authority part can be a hostname or an IPv4 address.
Required
User Agent
User Agent StringEnter a characteristic identification string that a software agent uses when operating in a network protocol.
Example
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.95 Safari/537.36.
Required

ThreatConnect® is a registered trademark of ThreatConnect, Inc.
Windows® is a registered trademark of Microsoft Corporation.

20003-02 v.01.C


Was this article helpful?

What's Next