Current ThreatQ Version Filter
 

IBM X-Force Exchange Operation

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

IBM X-Force Exchange is a cloud-based threat intelligence platform that allows you to consume, share and act on threat intelligence. It enables you to rapidly research the latest global security threats, aggregate actionable intelligence, consult with experts and collaborate with peers. IBM X-Force Exchange, supported by human- and machine-generated intelligence, leverages the scale of IBM X-Force to help users stay ahead of emerging threats.

The IBM X-Force Exchange operation provides Data Enrichment of indicators of compromise via the X-Force Exchange.

The operation provides the following actions:

  • IP Report - provides a summary of reputation information about an IP address.
  • Malware For IP - looks up malware associated with an IP Address.
  • URL Report - provides a summary of reputation information about a URL or FQDN.
  • Malware for URL - provides Malware listings associated with a URL or FQDN.
  • Malware for File Hash - provides a summary reputation report for MD5, SHA1, SHA256.
  • Vulnerability Report - returns information about a CVE.
  • WHOIS -  returns WHOIS information for an IP or FQDN.

The operation is compatible with the following indicator types:

  • CVE
  • FQDN
  • IP Address
  • SHA-1
  • SHA-256
  • URL

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Operation option from the Type dropdown (optional).
  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    API Key Your X-Force Exchange API Key to be used in HTTP headers for accessing feed data.
    API Password Your X-Force Exchange API Password to be used in HTTP headers for accessing feed data.
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

Actions

The  operation provides the following actions:

Action Description Object Type Object Subtype
IP Report Provides a summary of reputation information about an IP address. Indicator IP Address
Malware For IP Looks up malware associated with an IP Address. Indicator IP Address
URL Report Provides a summary of reputation information about a URL or FQDN. Indicator URL, FQDN
Malware For URL Provides Malware listings associated with a URL or FQDN. Indicator URL, FQDN
Malware for File Hash Provides a summary reputation report for MD5, SHA1, SHA256. Indicator MD5, SHA1, SHA256
Vulnerability Report Returns information about a CVE. Indicator CVE
WHOIS Returns WHOIS information for an IP or FQDN. Indicator IP Address, FQDN

IP Report

The IP Report action provides a summary of reputation information about an IP address.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.geo.countrycode Indicator.Attribute Country Code US N/A
.geo.country Indicator.Attribute Country United States N/A
.reason Indicator.Attribute X-Force Reason One of the five RIRs announced a (new) location mapping of the IP. N/A
.score Indicator.Attribute X-Force Score 1 N/A
.cats Indicator.Attribute X-Force Exchange Category N/A Extracted from the mapping's keys
.tags[].date Indicator.Attribute Date of Report N/A N/A
.subnets[].subnet RelatedIndicator.Value CIDR Block 8.8.8.0/24 N/A
.subnets[].score RelatedIndicator.Attribute X-Force Exchange Score 1 N/A
.subnets[].geo.countrycode RelatedIndicator.Attribute Country Code US N/A
.subnets[].geo.country RelatedIndicator.Attribute Country United States N/A

Malware for IP

The Malware for IP action looks up malware associated with an IP Address.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.malware[].family Indicator.Attribute Malware Family Spam Zero-Day N/A
.malware[].domain RelatedIndicator.Value FQDN soneramail.nl N/A
.malware[].md5 RelatedIndicator.Value MD5 256001D33DA5A13B1AD2E2322CE0B19E N/A
.malware[].firstseen RelatedIndicator.Attribute First Seen Date 2015-10-26T16:15:00Z N/A

URL Report

The URL Report action provides a summary of reputation information about a URL or FQDN.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.result.score Indicator.Attribute X-Force Exchange Score 1 N/A
.result.cats Indicator.Attribute X-Force Exchange Category Software / Hardware Extracted from the mapping's keys
.result.application.riskfactors Indicator.Attribute Risk Factor Insecure communication Extracted from the mapping's keys
.result.application.name Indicator.Attribute Application Name IBM Kenexa CompAnalyst N/A
.result.application.urls RelatedIndicator.Value URL https://ibm.com N/A
.result.application.urls RelatedIndicator.Value FQDN ibm.com N/A
.result.application.baseurl RelatedIndicator.Value URL http://01.ibm.com/software/smarterwork
force/compensation_divestiture
N/A

Malware for URL

The Malware for URL action provides Malware listings associated with a URL or FQDN.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.malware[].type Indicator.Attribute Malware Type SPM N/A
.malware[].md5 RelatedIndicator.Value MD5 3018E99857F31A59E0777396AE634A8F N/A
.malware[].domain RelatedIndicator.Value FQDN ibm.com N/A
.malware[].uri RelatedIndicator.Value URL 34835856.zip N/A
.malware[].ip RelatedIndicator.Value IP Address 87.235.177.251 N/A

Malware for File Hash

The Malware for File Hash action provides a summary reputation report for MD5, SHA1, SHA256.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.malware.created Indicator.Attribute Created Date 2014-10-20T23:19:00Z N/A
.malware.risk Indicator.Attribute Risk high N/A
.malware.origins.external.family Indicator.Attribute Malware Family generic N/A
.malware.family Indicator.Attribute Malware Family tsunami N/A
.malware.origins.CnCServers.rows.md5 RelatedIndicator.Value MD5 3018E99857F31A59E07
77396AE634A8F
Added with attribute Origin = CnCServers
.malware.origins.CnCServers.rows.domain RelatedIndicator.Value FQDN pc-guard.net Added with attribute Origin = CnCServers
.malware.origins.CnCServers.rows.ip RelatedIndicator.Value IP Address 61.255.239.86 Added with attribute Origin = CnCServers
.malware.origins.CnCServers.rows.uri RelatedIndicator.Value URL http://pc-guard.net/v.html Added with attribute Origin = CnCServers
.malware.origins.downloadServers.rows.md5 RelatedIndicator.Value MD5 3018E99857F31A59E07
77396AE634A8F
Added with attribute Origin = Download Servers
.malware.origins.downloadServers.rows.domain RelatedIndicator.Value FQDN pc-guard.net Added with attribute Origin = Download Servers
.malware.origins.downloadServers.rows.ip RelatedIndicator.Value IP Address 61.255.239.86 Added with attribute Origin = Download Servers
.malware.origins.downloadServers.rows.uri RelatedIndicator.Value URL http://pc-guard.net/v.html Added with attribute Origin = Download Servers
.malware.origins.emails.rows.md5 RelatedIndicator.Value MD5 3018E99857F31A59E07
77396AE634A8F
Added with attribute Origin = Email
.malware.origins.emails.rows.domain RelatedIndicator.Value FQDN pc-guard.net Added with attribute Origin = Email
.malware.origins.emails.rows.ip RelatedIndicator.Value IP Address 61.255.239.86 Added with attribute Origin = Email
.malware.origins.emails.rows.uri RelatedIndicator.Value URL http://pc-guard.net/v.html Added with attribute Origin = Email
.malware.origins.subjects.rows.md5 RelatedIndicator.Value MD5 3018E99857F31A59E077
7396AE634A8F
Added with attribute Origin = Subject
.malware.origins.subjects.rows.domain RelatedIndicator.Value FQDN pc-guard.net Added with attribute Origin = Subject
.malware.origins.subjects.rows.ip RelatedIndicator.Value IP Address 61.255.239.86 Added with attribute Origin = Subject
.malware.origins.subjects.rows.uri RelatedIndicator.Value URL http://pc-guard.net/v.html Added with attribute Origin = Subject

Vulnerability Report

The Vulnerability Report action returns information about a CVE.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.[].values() Indicator.Attribute [].keys() Denial of Service The Attribute Key is the value that it's on '[].keys()'. Ex: Consequences
.[].cvss.values() Indicator.Attribute CVSS + []cvss.keys() Low The Attribute Key is 'CVSS' appending the value that it's on '[]cvss.keys()'. Ex: CVSS Access Complexity
.[].platforms_affected[] Indicator.Attribute Platforms Affected HP Integrated Lights-Out 2 (iLO2) 2.23 N/A
.[].references[].link_target Indicator.Attribute Vulnerability Link http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2601 N/A

WHOIS

The WHOIS action returns WHOIS information for an IP or FQDN.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
extended.createdDate Indicator.Attribute Created Date 1986-03-19T00:00:00.000Z N/A
.extended.expiresDate Indicator.Attribute Expires Date 2021-03-20T04:00:00.000Z N/A
.extended.contact.values() Indicator.Attribute extended.contact.keys() IBM DNS Admin The Attribute Key is the value that it's on 'extended.contact.keys()'. Ex: Name
.extended.contactEmail RelatedIndicator.Value Email Address dnsadm@us.ibm.com N/A
.extended.registrarName RelatedIndicator.Attribute Registrar Name CSC CORPORATE DOMAINS, INC. N/A

Change Log

  • Version 1.1.1
    • Correct/Enhance error handling
  • Version 1.1.0
    • Restructuring the operation
  • Version 1.0.1
    • Fix the issue with Malware Family
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
IBM X-Force Exchange Operation Guide v1.1.1 4.34.0 or Greater