Spur Operation
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.1 |
Compatible with ThreatQ Versions | >= 4.56.0 |
Support Tier | ThreatQ Supported |
Introduction
Spur tracks anonymization services so that you can identify when anonymization services are touching your website, application, or network.
The Spur Operation allows analysts to perform quick context lookups for a given IP Address, bringing back anonymization information that can be used to determine if the IOC is a possible threat.
The Get Context action enables the automatic enrichment of IP Addresses in ThreatQ, using Spur's Context API. The API will tell you if the selected IOCs are used by anonymization services, as well as if the tunnels are used by a specific region, or used by a specific threat.
The operation provides the following action:
- Get Context - returns the context information collected by Spur about the selected IP.
The operation is compatible with the following indicator types:
- IP Address
- IPv6 Address
Prerequisites
The operation requires the following:
- A valid Spur API Key.
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the integration file on your local machine
ThreatQ will inform you if the operation already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the operation contains changes to the user configuration. The new user configurations will overwrite the existing ones for the operation and will require user confirmation before proceeding.
The operation is now installed and will be displayed in the ThreatQ UI. You will still need to configure and then enable the operation.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Operation option from the Type dropdown (optional).
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Spur Hostname or IP The hostname or IP address for your Spur instance. The default value is api.spur.us
.Spur API Key Your Spur API Key. Verify SSL Enable or Disable Host SSL certificate verification. - Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
Actions
The operation provides the following action:
Action | Description | Object Type | Object Subtype |
---|---|---|---|
Get Context | Performs a lookup against the Spur Context API | Indicators | IP Address, IPv6 Address |
Get Context
The Get Context action performs a lookup against Spur's API to enrich an IP Address with context pertaining to whether the IOC is used for tunnels and/or anonymization, as well as how the tunnel is typically used by threats.
GET https://api.spur.us/v2/context/{{ ip }}
Sample Response:
{
"as": {
"number": 30083,
"organization": "AS-30083-GO-DADDY-COM-LLC"
},
"client": {
"behaviors": ["TOR_PROXY_USER"],
"concentration": {
"city": "Weldon Spring",
"country": "US",
"density": 0.202,
"geohash": "9yz",
"skew": 45,
"state": "Missouri"
},
"count": 14,
"countries": 1,
"proxies": ["LUMINATI_PROXY", "SHIFTER_PROXY"],
"spread": 4941431,
"types": ["MOBILE", "DESKTOP"]
},
"infrastructure": "DATACENTER",
"ip": "148.72.164.186",
"location": {
"city": "St Louis",
"country": "US",
"state": "Missouri"
},
"risks": ["WEB_SCRAPING", "TUNNEL"],
"services": ["IPSEC", "OPENVPN"],
"tunnels": [
{
"anonymous": true,
"entries": ["148.72.164.179"],
"exits": ["148.72.164.177"],
"operator": "NORD_VPN",
"type": "VPN"
}
]
}
ThreatQuotient provides the following default mapping for this action:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.as.number |
Indicator.Attribute | ASN | N/A | 30083 |
N/A |
.as.organization |
Indicator.Attribute | AS Organization | N/A | AS-30083-GO- |
N/A |
.client.behaviors[] |
Indicator.Attribute | Client Behavior | N/A | TOR_PROXY_USER |
N/A |
.client.concentration. |
Indicator.Attribute | Client Concentration City | N/A | Weldon Spring |
N/A |
.client.concentration. |
Indicator.Attribute | Client Concentration Country Code | N/A | US |
N/A |
.client.concentration. |
Indicator.Attribute | Client Concentration State | N/A | Missouri |
N/A |
.client.concentration. |
Indicator.Attribute | Client Concentration Density | N/A | 0.202 |
N/A |
.client.concentration. |
Indicator.Attribute | Client Concentration Geohash | N/A | 9yz |
N/A |
.client.concentration. |
Indicator.Attribute | Client Concentration Skew | N/A | 45 |
N/A |
.client.proxies[] |
Indicator.Attribute | Client Proxy | N/A | SHIFTER_PROXY |
N/A |
.client.types[] |
Indicator.Attribute | Client Type | N/A | DESKTOP |
N/A |
.infrastructure |
Indicator.Attribute | Infrastructure | N/A | DATACENTER |
N/A |
.location.city |
Indicator.Attribute | City | N/A | St Louis |
N/A |
.location.country |
Indicator.Attribute | Country Code | N/A | US |
N/A |
.location.state |
Indicator.Attribute | State | N/A | Missouri |
N/A |
.risks[] |
Indicator.Attribute | Risk | N/A | WEB_SCRAPING |
N/A |
.services[] |
Indicator.Attribute | Service | N/A | IPSEC |
N/A |
.tunnels[].operator |
Indicator.Attribute | Tunnel Operator | N/A | NORD_VPN |
N/A |
.tunnels[].type |
Indicator.Attribute | Tunnel Type | N/A | VPN |
N/A |
.tunnels[].entries[] |
Indicator.Value | IP Address | N/A | N/A | N/A |
.tunnels[].exits[] |
Indicator.Value | IP Address | N/A | N/A | N/A |
.tunnels[].anonymous |
Indicator.Attribute | Is Anonymized | N/A | True |
N/A |
N/A | Indicator.Attribute | Node Type | N/A | Entry |
Entry if the IP is in .tunnels[] . Exit if the IP is in .tunnels[].exits[] |
Change Log
- Version 1.0.1
- Added the following configurations parameters:
- Spur Hostname or IP - allows you to specify the hostname or IP of your Spur instance.
- SSL Verification - enable or disable Host SSL certificate verification.
- Added the following configurations parameters:
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Spur Operation Guide v1.0.1 | 4.56.0 or Greater |
Spur Operation Guide v1.0.0 | 4.56.0 or Greater |