Blueliv CTI CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.1 |
Compatible with ThreatQ Versions | >= 4.25.0 |
Support Tier | ThreatQ Supported |
Introduction
The Blueliv Intelligence integration for ThreatQ allows a user to ingest Blueliv's cyber threat intelligence from their v1 API Supported CTI feeds:
- Bot IPs - allows the user to pull back CTI about IPs that are related to botnets, that Blueliv tracks. This includes IP Addresses and URLs.
- Crimeservers - allows the user to pull back CTI about crimeservers that Blueliv tracks. This includes URLs, IPs, and ASNs.
- Attacking IPs - allows the user to pull back CTI about IPs that are currently "attaacking" that Blueliv tracks. This includes only IP Addresses.
- Malware - allows the user to pull back CTI about malware hashes that Blueliv tracks. This includes MD5s, SHA-1s, and SHA-256s.
Blueliv provides automated, real-time threat intelligence data, ultimately streamlining the delivery of valuable data into ThreatQ for analysis and correlation with network events.
Pairing Blueliv’s confidence level with ThreatQ’s Scoring System helps analysts reduce the noise and identify relevant events more quickly.
- Blueliv’s attack feed provides targeted information, making it easier to find, mitigate and contain the attack.
- Importing IP and FQDN indicators associated with botnets and crime servers.
- Ingesting hashes and attributes indicating the type, family, architecture and confidence of the malware.
- Creating relationships between related IPs, hashes and FQDNs.
The integration ingests the following system objects:
- Indicators
- Indicator Attributes
- Malware
- Malware Attributes
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Labs option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
All Feeds
Parameter Description API Key Your Blueliv API Key (v1) for authentication. Blueliv Crimeservers
Parameter Description Endpoint The Blueliv API endpoint determines the time range for fetched threat intelligence. Options include:
- Last (Rate Limit: 2 Requests / 15m)
- Online (Rate Limit: 2 Requests / 1h) (Default)
- Recent (Rate Limit: 2 Requests / 24h)
Blueliv Malware Hashes
Parameter Description Confidence Filter The Confidence Levels to be ingested. Options include:
- High (default)
- Medium (default)
- Low
Endpoint The Blueliv API endpoint determines the time range for fetched threat intelligence. Options include:
- Last (Rate Limit: 2 Requests / 15m)
- Online (Rate Limit: 2 Requests / 1h) (Default)
- Recent (Rate Limit: 2 Requests / 24h)
Blueliv Attacking IPs
Parameter Description Attack Type Filter The Attack Types to be ingested Options include:
- Brute Force (Default)
- Random SYN Attack (Default)
- Targeted Service Scan (Default)
- Login Attempt
- Service Scan
- Port Scan
Endpoint The Blueliv API endpoint determines the time range for fetched threat intelligence. Options include:
- Last (Rate Limit: 2 Requests / 15m)
- Online (Rate Limit: 2 Requests / 1h) (Default)
Blueliv Bot IPs
Parameter Description Endpoint The Blueliv API endpoint determines the time range for fetched threat intelligence. Options include:
- Last (Rate Limit: 2 Requests / 10m)
- Recent (Rate Limit: 2 Requests / 1h)
- POS Last (Rate Limit: 2 Requests / 10m)
- POS Recent (Rate Limit: 2 Requests / 1h)
- Full Last (Rate Limit: 2 Requests / 10m)
- Full Recent (Rate Limit: 2 Requests / 1h) (Default)
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
All Feeds
The following mapping applies to all feeds (where Object
represents the object ingested by each feed, regardless of type).
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.{endpoint_name}.country | Object.Attribute | Country Code | .createdAt or .firstSeenAt | US | N/A |
.{endpoint_name}.countryName | Object.Attribute | Country | .createdAt or .firstSeenAt | United States | N/A |
.{endpoint_name}.city | Object.Attribute | City | .createdAt or .firstSeenAt | New York City | N/A |
.{endpoint_name}.latitude | Object.Attribute | Latitude | .createdAt or .firstSeenAt | 37.751 | N/A |
.{endpoint_name}.longitude | Object.Attribute | Longitude | .createdAt or .firstSeenAt | -97.822 | N/A |
Blueliv Crimeservers
The Blueliv Crimeservers feed allows the user to pull back CTI about crimeservers that Blueliv tracks. This includes URLs, IPs, and ASNs.
GET https://api.blueliv.com/v1/crimeserver/<frequency>
Sample Response:
{
"crimeServers": [
{
"_id": "4e3e47ffcfdf26540790c5011f0e6c97b67d0521ea518dc4e7ae518298f3545b",
"url": "https://atendimentoonlinecliente.live/home.php",
"type": "PHISHING",
"subType": "UNCLASSIFIED",
"status": "ONLINE",
"domain": "atendimentoonlinecliente.live",
"host": "atendimentoonlinecliente.live",
"updatedAt": "2020-05-07T12:45:00+0000",
"firstSeenAt": "2020-04-23T00:34:40+0000",
"lastSeenAt": "2020-05-07T12:35:02+0000",
"confidence": 1
},
{
"_id": "ada6a4216c480190eddbbd92c1df42dcca40aae7d913411845091eeeac5dc2ae",
"url": "http://afterworld.net/index.php",
"type": "C_AND_C",
"subType": "BAYROB",
"country": "US",
"countryName": "United States",
"status": "ONLINE",
"statusCode": 200,
"domain": "afterworld.net",
"host": "afterworld.net",
"latitude": 37.751,
"longitude": -97.822,
"ip": "69.172.201.153",
"updatedAt": "2020-05-07T12:49:51+0000",
"asnId": 19324,
"asnDesc": "DOSARREST, US",
"firstSeenAt": "2017-08-18T21:29:20+0000",
"lastSeenAt": "2020-05-07T12:49:50+0000",
"confidence": 4
}
]
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.crimeServers[].url | Indicator.Value | URL | .crimeServers[].firstSeenAt | https://atendimentoonlinecliente. live/home.php |
N/A |
.crimeServers[].ip | Indicator.Value | IP Address | .crimeServers[].firstSeenAt | 11.22.33.44 | N/A |
.crimeServers[].asnId | Indicator.Value | ASN | .crimeServers[].firstSeenAt | 19324 | N/A |
.crimeServers[].subType | Malware.Value | N/A | .crimeServers[].firstSeenAt | PONY | 'UNCLASSIFIED' is ignored |
.crimeServers[].type | Indicator.Attribute | Type | .crimeServers[].firstSeenAt | PHISHING | Title-cased |
.crimeServers[].status | Indicator.Attribute | Status | .crimeServers[].firstSeenAt | ONLINE | Title-cased |
.crimeServers[].statusCode | Indicator.Attribute | Status Code | .crimeServers[].firstSeenAt | 200 | N/A |
.crimeServers[].confidence | Indicator.Attribute | Confidence | .crimeServers[].firstSeenAt | 0 |
Blueliv Malware Hashes
The Blueliv Malware Hashes feed allows the user to pull back CTI about malware hashes that Blueliv tracks. This includes MD5s, SHA-1s, and SHA-256s.
GET https://api.blueliv.com/v1/malware/<frequency>
Sample Response:
{
"malwares": [
{
"filename": "bcd3dd873b1211fc243ad6754838dcef8041012d39fe755dd2612f21165699c0",
"contentType": "application/x-dosexec",
"md5": "ccfd75bbe6d1dc9dcd09c01f4b4e91dd",
"sha1": "4e9d5154d0ada0ec892fe36a75243f73935f25ff",
"sha256": "bcd3dd873b1211fc243ad6754838dcef8041012d39fe755dd2612f21165699c0",
"analyzedAt": "2020-05-07T12:00:04+0000",
"firstSeenAt": "2020-05-07T11:17:31+0000",
"fileType": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed",
"fileSize": 54429,
"malwareType": "SYTRO",
"confidence": "HIGH",
"architecture": "WIN32",
"signatures": [
{
"description": "The signatures of the analysis have reached INFORMATIVE severity level. This level holds uncommon non-malicious actions, and behavioral information of the analyzed sample",
"name": "Signature severity - Informative",
"severity": 1
},
{
"description": "The analyzed sample creates Windows executable files on the filesystem",
"name": "Creates Window executable",
"severity": 2
},
{
"description": "The analyzed sample creates a slightly modified copy of itself",
"name": "Detected Polymorphism",
"severity": 3
},
{
"description": "File has been identified by at least 40 AntiVirus engines on VirusTotal as malicious. The reliability of the data regarding this signature comes from the retrieved values from third party applications or functionalities based on their criteria",
"name": "VirusTotal matches",
"severity": 6
},
{
"description": "The signatures of the analysis have reached MALICIOUS severity level. This level holds malicious actions and common malware behavior like process injection, process inspection, anti-analysis techniques, stealth and persistence mechanisms, and so on",
"name": "Signature severity - Malicious",
"severity": 3
}
]
}
]
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.malwares[].md5 | Indicator.Value | MD5 | .malwares[].firstSeenAt | 1f6d1b5a948bf563cbe45a2 36c47422b |
N/A |
.malwares[].sha1 | Indicator.Value | SHA-1 | .malwares[].firstSeenAt | 3D852B2CA270617FA53BFB 48589A2DA8ED940F4B |
N/A |
.malwares[].sha256 | Indicator.Value | SHA-256 | .malwares[].firstSeenAt | 66335C38D58473F0269C96D 5FD6E16C57EE7DE4F35B71B 7BFD8ED12DE9C97D01 |
N/A |
.malwares[].signatures[].name | Signature.Title | Indirect | .malwares[].firstSeenAt | Detected Polymorphism | N/A |
.malwares[].signatures[].description | Signature.Value | Indirect | .malwares[].firstSeenAt | The analyzed sample creates a slightly modified copy of itself | N/A |
.malwares[].malwareType | Malware.Value | N/A | .malwares[].firstSeenAt | SYTRO | Title-cased; 'UNCLASSIFIED' is ignored |
.malwares[].signatures[].severity | Signature.Attribute | Severity | .malwares[].firstSeenAt | 4 | 1-10 |
.malwares[].contentType | Indicator.Attribute, Malware.Attribute | Content Type | .malwares[].firstSeenAt | application/x-dosexec | N/A |
.malwares[].confidence | Indicator.Attribute, Malware.Attribute | Confidence | .malwares[].firstSeenAt | HIGH | Title-cased |
.malwares[].architecture | Indicator.Attribute, Malware.Attribute | Architecture | .malwares[].firstSeenAt | WIN32 | Title-cased |
.malwares[].malwareFamily | Indicator.Attribute, Malware.Attribute | Malware Family | .malwares[].firstSeenAt | POS | N/A |
.malwares[].fileSize | Indicator.Attribute, Malware.Attribute | File Size | .malwares[].firstSeenAt | N/A | N/A |
.malwares[].analyzedAt | Indicator.Attribute, Malware.Attribute | Analyzed At | .malwares[].firstSeenAt | N/A | N/A |
Blueliv Attacking IPs
The Blueliv Attaclomg IPs feed allows the user to pull back CTI about IPs that are currently "attacking" that Blueliv tracks. This includes only IP Addresses.
GET https://api.blueliv.com/v1/attack/<frequency>
Sample Response:
{
"attacks": [
{
"_id": "5ed790c9a3f96154f24a532b",
"attackType": "BRUTE_FORCE",
"firstEvent": "2020-06-03T11:38:02+0000",
"lastEvent": "2020-06-03T12:22:24+0000",
"numEvents": 12,
"source": {
"ip": "5.188.87.51",
"country": "IE",
"countryName": "Ireland",
"city": "Ballingeary",
"port": [
56964,
36742,
55112,
61868,
40684,
43596,
55566,
49206,
34838,
63800,
63450,
50812
],
"latitude": 51.85,
"longitude": -9.2333
},
"destination": {
"ip": "xxx.xxx.141.155",
"country": "GB",
"countryName": "United Kingdom",
"city": "London",
"port": [
22
],
"serviceName": [
"ssh"
],
"latitude": 51.5128,
"longitude": -0.0638
},
"createdAt": "2020-06-03T12:00:01+0000",
"updatedAt": "2020-06-03T12:30:00+0000",
"confidence": 0
},
{
"_id": "5ed790c9a3f96154f24a532a",
"attackType": "LOGIN_ATTEMPT",
"firstEvent": "2020-06-03T11:50:17+0000",
"lastEvent": "2020-06-03T11:50:17+0000",
"numEvents": 1,
"source": {
"ip": "88.214.26.97",
"country": "DE",
"countryName": "Germany",
"port": [
53946
],
"latitude": 51.2993,
"longitude": 9.491
},
"destination": {
"ip": "xxx.xxx.113.72",
"country": "SG",
"countryName": "Singapore",
"city": "Singapore",
"port": [
22
],
"serviceName": [
"ssh"
],
"latitude": 1.3001,
"longitude": 103.7864
},
"createdAt": "2020-06-03T12:00:01+0000",
"updatedAt": "2020-06-03T12:00:01+0000",
"confidence": 0
}
]
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.attacks[].source.ip | Indicator.Value | IP Address | .attacks[].createdAt | 51.36.64.40 | N/A |
.attacks[].confidence | Indicator.Attribute | Confidence | .attacks[].createdAt | 0 | N/A |
.attacks[].destination.serviceName | Indicator.Attribute | Target Service | .attacks[].createdAt | smbd | N/A |
.attacks[].attackType | Indicator.Attribute | Attack Type | .attacks[].createdAt | BRUTE_FORCE | Formatted by replacing underscores and title-casing |
Blueliv Bot IPs
The Blueliv Bot IPs feed allows the user to pull back CTI about IPs that are related to botnets, that Blueliv tracks. This includes IP Addresses and URLs.
GET https://api.blueliv.com/v1/ip/<frequency>
Sample Response:
{
"ips": [
{
"confidence": 0,
"botnetFamily": [
"Credential Grabber"
],
"ip": "51.36.64.40",
"country": "SA",
"countryName": "Saudi Arabia",
"latitude": 21.5168,
"longitude": 39.2192,
"seenAt": "2017-09-26T05:57:19+0000",
"destinationPort": 443,
"botnetType": "PONY",
"operatingSystem": "Windows 7",
"botId": "b7ae4cfb58c159149a297865312748e6688c3f7e59d9aa8fd3d8ba44ba8f01d4",
"city": "Jeddah",
"portalUrl": "https://login.live.com/login.srf",
"portalDomain": "live.com",
"createdAt": "2020-05-07T12:50:20+0000"
},
{
"confidence": 0,
"botnetFamily": [
"Trojan Banker"
],
"ip": "59.115.110.121",
"country": "TW",
"countryName": "Taiwan",
"latitude": 25.0478,
"longitude": 121.5318,
"seenAt": "2017-09-26T05:57:51+0000",
"botnetUrl": "http://poluxradio.com/wp-content/plugins/akismet/gate.php",
"botnetIp": "108.59.11.19",
"botnetType": "ZEUS",
"userAgent": "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5)",
"city": "Taipei",
"createdAt": "2020-05-07T12:54:04+0000"
}
]
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ips[].botnetIp | Indicator.Value | IP Address | .ips[].createdAt | 59.115.110.121 | N/A |
.ips[].botnetUrl | Indicator.Value | URL | .ips[].createdAt | http://poluxradio.com/wp-content/plugins/akismet/gate.php | N/A |
.ips[].ip | Indicator.Value | IP Address | .ips[].createdAt | 108.59.11.19 | N/A |
.ips[].botnetType | Malware.Value | N/A | .ips[].createdAt | ZEUS | 'unknown' is ignored |
.ips[].confidence | Indicator.Attribute | Confidence | .ips[].createdAt | 0 | N/A |
.ips[].botnetFamily[] | Indicator.Attribute, Malware.Attribute | Malware Family | .ips[].createdAt | Trojan Banker | N/A |
.ips[].operatingSystem | Indicator.Attribute, Malware.Attribute | Bot Operating System | .ips[].createdAt | Windows 7 | N/A |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Blueliv Crimeservers
Metric | Result |
---|---|
Run Time | 10 minutes |
Indicators | 8,000 |
Indicator Attributes | 61,000 |
Malware | 80 |
Blueliv Malware Hashes
Metric | Result |
---|---|
Run Time | 4 minutes |
Indicators | 4,400 |
Indicator Attributes | 26,000 |
Malware | 100 |
Blueliv Attacking IPs
Metric | Result |
---|---|
Run Time | < 1 minute |
Indicators | 110 |
Indicator Attributes | 760 |
Blueliv Bot IPs
Metric | Result |
---|---|
Run Time | < 1 minute |
Indicators | 75 |
Indicator Attributes | 110 |
Malware | 8 |
Malware Attributes | 7 |
Known Issues / Limitations
- For feeds with an endpoint with a rate limit of less than 1 request/hour, choosing that endpoint while doing hourly runs may cause feed runs to fail due to the provider's rate limiting policy.
Change Log
- Version 1.0.1
- Resolved a filter mapping issue for the Blueliv Crimeservers feed.
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Blueliv CTI CDF Guide v1.0.1 | 4.25.0 or Greater |
Blueliv CTI CDF Guide v1.0.0 | 4.25.0 or Greater |