Current ThreatQ Version Filter
 

Zvelo CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Zvelo CDF provides contextual datasets, premium phishing and malicious threat intelligence.

The integration provides the following feeds:

  • Zvelo PhishBlocklist - ingests phishing threats from Zvelo that are enriched with additional metadata attributes.
  • Zvelo Malicious Detailed Detection - ingests malicious threat intelligence data from Zvelo that is enriched with additional metadata attributes.
  • Zvelo Threats - ingests malicious IoCs from Zvelo, that are enriched with additional metadata attributes.

The integration ingests the following system objects:

  • Indicators
    • Indicator Attributes

Prerequisites

The Zvelo CDF requires the following:

  • Zvelo API Client ID
  • Zvelo Client Secret

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Client ID Your Zvelo API Client ID to authenticate.
    Client Secret Your Zvelo API Client Secret to authenticate.
    Status Filter the results based on the status of the indicator. Options include:
    • All (default)
    • Active
    • Inactive
    Confidence The minimum value of the confidence for which an indicator will be ingested.  The default value for this parameter is 0.
    Update Indicator Status Select whether to update the status of the indicator with the Zvelo status.  This parameter is disabled by default.  See the Known Issues section for further details on this parameter option.  

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Zvelo PhishBlocklist

The Zvelo PhishBlocklist feed ingests phishing threats from Zvelo, that are enriched with additional metadata attributes.

GET https://api.zvelo.io/v1/phish

{
    "_meta": {
        "version": "1",
        "request_id": "2RHnGMyFWZJla85CRRigTAxdvMb",
        "generated_at": "2023-06-16T11:42:57.666041272Z",
        "requested_query": ""
    },
    "_response_part": {
        "page_no": 1,
        "num_pages": 2
    },
    "phish_info": {
        "phish": [
            {
                "ip_info": [
                    {
                        "ip": "2606:4700::6812:375"
                    },
                    {
                        "ip": "104.18.3.117"
                    }
                ],
                "url": "http://uspssitechange.com/",
                "discovered_date": "2023-06-16T11:12:49Z",
                "brand": "usps",
                "confidence_level": 80,
                "last_active_date": "2023-06-16T11:12:49Z",
                "status": "inactive",
                "last_verified_date": "2023-06-16T11:38:47.625155Z"
            }
        ]
    }
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.phish_info.phish[].url Indicator.Value URL .phish_info.phish[].
discovered_date
http://uspssitechange.com/ N/A
.phish_info.phish[].ip_info[].ip Related Indicator.Value IP Address / IPv6 Address .phish_info.phish[].
discovered_date
104.18.3.117 N/A
.phish_info.phish[].brand Indicator.Attribute, Related Indicator.Attribute Brand .phish_info.phish[].
discovered_date
usps N/A
.phish_info.phish[].
confidence_level
Indicator.Attribute, Related Indicator.Attribute Confidence Level .phish_info.phish[].
discovered_date
80 N/A
.phish_info.phish[].
last_active_date
Indicator.Attribute, Related Indicator.Attribute Last Active Date .phish_info.phish[].
discovered_date
2023-06-16T11:12:49Z The attribute value is updated at ingestion
.phish_info.phish[].
last_verified_date
Indicator.Attribute, Related Indicator.Attribute Last Verified Date .phish_info.phish[].
discovered_date
2023-06-16T11:38:47.625155Z The attribute value is updated at ingestion

Zvelo Malicious Detailed Detection

The Zvelo Malicious Detailed Detection feed ingests malicious threat intelligence data from Zvelo, that is enriched with additional metadata attributes.

GET https://api.zvelo.io/v1/malicious

{
    "_meta": {
        "version": "1",
        "request_id": "2RQLffZwjb3WIPVmNUlhWecTHue",
        "generated_at": "2023-06-19T12:24:22.717062214Z",
        "requested_query": ""
    },
    "_response_part": {
        "page_no": 0,
        "num_pages": 1
    },
    "malicious_info": {
      "malicious": [
            {
                "ip_info": [
                    {
                        "ip": "117.213.42.81"
                    }
                ],
                "url": "http://117.213.42.81/Mozi.m/",
                "discovered_date": "2023-06-19T11:40:28Z",
                "confidence_level": 100,
                "last_active_date": "2023-06-19T11:40:28Z",
                "status": "active",
                "last_verified_date": "2023-06-19T11:40:28.558398Z"
            }
        ]
    }
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.phish_info.phish[].url Indicator.Value URL .phish_info.phish[].
discovered_date
http://uspssitechange.com/ N/A
.phish_info.phish[].ip_info[].ip Related Indicator.Value IP Address / IPv6 Address .phish_info.phish[].
discovered_date
104.18.3.117 N/A
.phish_info.phish[].brand Indicator.Attribute, Related Indicator.Attribute Brand .phish_info.phish[].
discovered_date
usps N/A
.phish_info.phish[].
confidence_level
Indicator.Attribute, Related Indicator.Attribute Confidence Level .phish_info.phish[].
discovered_date
80 N/A
.phish_info.phish[].
last_active_date
Indicator.Attribute, Related Indicator.Attribute Last Active Date .phish_info.phish[].
discovered_date
2023-06-16T11:12:49Z The attribute value is updated at ingestion
.phish_info.phish[].
last_verified_date
Indicator.Attribute, Related Indicator.Attribute Last Verified Date .phish_info.phish[].
discovered_date
2023-06-16T11:38:47.625155Z The attribute value is updated at ingestion

Zvelo Threats

The Zvelo Threats feed ingests threats (IOCs) from Zvelo's API. These IOCs may be phishing URLs, C2 servers, or other types of threats.

GET https://api.zvelo.io/v1/threat

{
  "_meta": {
    "version": "1",
    "request_id": "2VGItRIlDpUxCicOiWhCCXxGZD1",
    "generated_at": "2023-09-11T18:16:44.427844289Z",
    "requested_query": ""
  },
  "_response_part": {
    "page_no": 0,
    "num_pages": 1
  },
  "threat_info": {
    "threat": [
      {
        "id": "bb5793b2-25dd-436b-b3b8-9c87836da1c7",
        "ioc": "39.105.50.248:443",
        "ioc_type": "ip",
        "threat_type": "command and control",
        "malware_family": "covenant",
        "ip_info": [
          {
            "ip": "39.105.50.248"
          }
        ],
        "discovered_date": "2022-08-04T09:02:19Z",
        "confidence_level": 100,
        "last_active_date": "2023-09-11T05:07:24Z",
        "status": "active",
        "last_verified_date": "2023-09-11T05:07:24Z",
        "updated_at": "2023-09-11T05:08:57.248228Z",
        "action": "u"
      }
    ]
  }
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ioc Indicator.Value Based on .ioc_type value .discovered_date 39.105.50.248 N/A
.ip_info[].ip Related Indicator.Value IP Address / IPv6 Address .discovered_date N/A N/A
.malware_family Indicator.Attribute, Related Indicator.Attribute Malware Family .discovered_date covenant N/A
.confidence Indicator.Attribute, Related Indicator.Attribute Confidence .discovered_date 100 N/A
.threat_type Indicator.Attribute, Related Indicator.Attribute Threat Type .discovered_date command and control N/A
.last_active_date Indicator.Attribute, Related Indicator.Attribute Last Active Date .discovered_date 2023-09-11T05:07:24Z The attribute value is updated at ingestion
.last_verified_date Indicator.Attribute, Related Indicator.Attribute Last Verified Date .discovered_date 2023-09-11T05:07:24Z The attribute value is updated at ingestion
.updated_at Indicator.Attribute, Related Indicator.Attribute Updated At .discovered_date 2023-09-11T05:08:57.248228Z The attribute value is updated at ingestion

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Zvelo PhishBlocklist

Metric Result
Run Time 1 minute
Indicators 170
Indicator Attributes 1,019

Zvelo Malicious Detailed Detection

Metric Result
Run Time 1 minute
Indicators 87
Indicator Attributes 409

Zvelo Threats

Metric Result
Run Time 1 minute
Indicators 873
Indicator Attributes 6,499

Known Issues / Limitations

  • The Run Frequency should be set to Hourly as the Zvelo API limits the time range to an hour.
  • In order for the Status of the Indicator to be updated, confirm that the Active status is not protected from feed override. This can be set from the Object Management page on your ThreatQ instance.

Change Log

  • Version 1.1.0
    • Added new feed: Zvelo Threats.  
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Zvelo CDF Guide v1.1.0 4.27 or Greater
Zvelo CDF Guide v1.0.0 4.27 or Greater