次のIOCのサンプルは、IPアドレスに接続するmalware.exeファイルを検索します。
<?xml version="1.0" encoding="us-ascii"?>
<ioc>
<rule_name>CompanyPolicy_1</rule_name>
<rule_type>KnownThreat</rule_type>
<rule_description>malware.exe connect ip</rule_description>
<last_modified_time>2016-02-22T14:32:02</last_modified_time>
<rule_category></rule_category>
<author_name>TM_Tester</author_name>
<source>TMES</source>
<internalnote>malware.exe connect ip</internalnote>
<definition>
<Indicator operator="AND" type="knownthreat">
<Indicator operator="AND">
<IndicatorItem condition="is">
<Context document="FileItem"
search="FileItem/FileName"/>
<Content type="string">malware.exe</Content>
</IndicatorItem>
<IndicatorItem condition="is">
<Context document="FileItem"
search="FileItem/Fileextension "/>
<Content type="string">exe</Content>
</IndicatorItem>
</Indicator>
<Indicator operator="AND">
<IndicatorItem condition="is">
<Context document="DnsEntryItem"
search="DnsEntryItem/Host" type="mir" />
<Content type="string">54.209.221.129</Content>
</IndicatorItem>
</Indicator>
</Indicator>
</definition>
</ioc>
