Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Python library - modules for processing data from the TI and DRP system collected in one library. This library simplifies work with the products API and gives you the flexibility to customize the search and retrieval of data from the system.
CyberIntegrations - Python library to communicate with Company Products (TI, DRP) via API.
This project is licensed under the MIT License - see the LICENSE file for details.
Lib deps: pyaml, requests, urllib3, dataclasses.
CyberIntegrations lib is available on PyPI:
pip install cyberintegrations
Or use a Portal WHL archive. Replace X.X.X
with current lib version:
pip install ./cyberintegrations-X.X.X-py3-none-any.whl
Initialize poller with your credentials and set proxy (proxy should be in request-like format) if required.
Change SSL Verification using set_verify()
method.
If verify is set to False
, requests will accept any TLS certificate.
If verify is set to True
, requiring requests to verify the TLS certificate at the remote end.
Put a path-like string to the custom TLS certificate if required.
from cyberintegrations import TIPoller, DRPPoller
poller = TIPoller(username='example@gmail.com', api_key='API_KEY', api_url="API_URL")
poller.set_proxies(
proxy_protocol=PROXY_PROTOCOL,
proxy_port=PROXY_PORT,
proxy_ip=PROXY_ADDRESS,
proxy_password=PROXY_PASSWORD,
proxy_username=PROXY_USERNAME
)
poller.set_verify(True)
Method set_keys()
sets keys to search in the selected collection. It should be python dict mapping_keys = {key: value}
where
key - result name
value - dot-notation string with searchable keys
mapping_keys = {"result_name": "searchable_key_1.searchable_key_2"}
Parser finds keys recursively in the API response, using dot-notation in value.
If you want to add your own data to the results start the value with star *
.
mapping_keys = {
"network": "indicators.params.ip",
"result_name": "*My_Value"
}
For set_keys()
or set_iocs_keys()
methods you can make a full template to get nested data in the way you want.
mapping_keys = {
'network': {
'ips': 'indicators.params.ip'
},
'url': 'indicators.params.url',
'type': '*network'
}
poller.set_keys(collection_name="apt/threat", keys=mapping_keys)
poller.set_iocs_keys(collection_name="apt/threat", keys={"ips": "indicators.params.ip"})
Use the next methods create_update_generator()
, create_search_generator()
to create a generator, which return portions of limited feeds.
Update generator - goes through the feeds in ascending order. Feeds iteration based on seqUpdate
field.
Search generator - goes through the feeds in descending order. Feeds iteration based on resultId
field.
Note: Update generator iterates over all collections excluding compromised/breached
and compromised/reaper
.
Sequence update logic is not applied to these collections.
generator = poller.create_update_generator(
collection_name='compromised/account_group',
date_from='2021-01-30',
date_to='2021-02-03',
query='8.8.8.8',
sequpdate=20000000,
limit=200
)
Each portion (iterable object) presented as Parser
class object.
You can get raw data (in json format) or parsed portion (python dictionary format),
using its methods and attributes.
for portion in generator:
parsed_json = portion.parse_portion(as_json=False)
iocs = portion.get_iocs(as_json=False)
sequpdate = portion.sequpdate
count = portion.count
raw_json = portion.raw_json
raw_dict = portion.raw_dict
new_parsed_json = portion.bulk_parse_portion(keys_list=[{"ips": "indicators.params.ip"}, {"url": 'indicators.params.url'}], as_json=False)
Attribute sequpdate
of the generator iterable object, gives you the last sequence update number (seqUpdate
)
of the feed, which you can save locally.
sequpdate = portion.sequpdate
Attribute count
of the generator iterable object, shows you the number of feeds left. This amount still in the queue.
For Search generator count
will return total number of feeds in the queue.
count = portion.count
Methods parse_portion()
and get_iocs()
of generator iterable objects, use your
mapping keys (IoCs keys) to return parsed data.
You can override mapping keys using keys
parameter in these functions.
parsed_json = portion.parse_portion(as_json=False)
iocs = portion.get_iocs(as_json=False, keys=mapping_override_keys)
Also, you can use bulk_parse_portion()
method to get multiple parsed dicts from every feed.
new_parsed_json = portion.bulk_parse_portion(keys_list=[{"ips": "indicators.params.ip"}, {"url": 'indicators.params.url'}], as_json=False)
You can use some additional functions if required.
You should use get_available_collections()
method before the normal API response if you want to avoid
errors trying to access collections that you have no access to.
collection_list = poller.get_available_collections()
seq_update_dict = poller.get_seq_update_dict(date='2020-12-12')
compromised_account_sequpdate = seq_update_dict.get('compromised/account')
You can find specific feed by id with this command that also returns Parser object.
feed = poller.search_feed_by_id(collection_name='compromised/account', feed_id='some_id')
parsed_feed = feed.parse_portion()
You can get binary file from threat reports.
binary_file = poller.search_file_in_threats(collection_name='hi/threat', feed_id='some_id', file_id='some_file_id_inside_feed')
Don’t forget to close session in try…except…finally block, or use poller with context manager.
from cyberintegrations import TIPoller
from cyberintegrations.exception import InputException
...
try:
poller = TIPoller(username='example@gmail.com', api_key='API_KEY', api_url="API_URL")
...
except InputException as e:
logger.info("Wrong input: {0}".format(e))
finally:
poller.close_session()
Common example of API response from Collection (received feeds):
api_response = [
{
'iocs': {
'network': [
{
'ip': [1, 2],
'url': 'url.com'
},
{
'ip': [3],
'url': ''
}
]
}
},
{
'iocs': {
'network': [
{
'ip': [4, 5],
'url': 'new_url.com'
}
]
}
}
]
Your mapping dict for parse_portion()
or bulk_parse_portion()
methods:
mapping_keys = {
'network': {'ips': 'iocs.network.ip'},
'url': 'iocs.network.url',
'type': '*custom_network'
}
Result of parse_portion()
output:
parsing_result = [
{
'network': {'ips': [[1, 2], [3]]},
'url': ['url.com', ''],
'type': 'custom_network'
},
{
'network': {'ips': [[4, 5]]},
'url': ['new_url.com'],
'type': 'custom_network'
}
]
Result of bulk_parse_portion()
output:
parsing_result = [
[
{
'network': {'ips': [[1, 2], [3]]},
'url': ['url.com', ''],
'type': 'custom_network'}
],
[
{
'network': {'ips': [[4, 5]]},
'url': ['new_url.com'],
'type': 'custom_network'}
]
]
Your mapping dict for get_iocs()
method:
mapping_keys = {
'ips': 'iocs.network.ip',
'url': 'iocs.network.url'
}
Result of get_iocs()
output:
parsing_result = {
'ips': [1, 2, 3, 4, 5],
'url': ['url.com', 'new_url.com']
}
import logging
from cyberintegrations import TIPoller
from cyberintegrations.exception import InputException, ConnectionException, ParserException
logging.basicConfig(level=logging.DEBUG, format='%(asctime)s - %(name)s - %(levelname)s - %(message)s')
...
try:
poller = TIPoller(username=username, api_key=api_key, api_url=api_url)
poller.set_proxies(proxy_protocol=PROXY_PROTOCOL,
proxy_port=PROXY_PORT,
proxy_ip=PROXY_ADDRESS,
proxy_password=PROXY_PASSWORD,
proxy_username=PROXY_USERNAME)
poller.set_verify(True)
for collection, keys in keys_config.items():
poller.set_keys(collection, keys)
for collection, state in update_generator_config.items():
if state.get("sequpdate"):
generator = poller.create_update_generator(collection_name=collection, sequpdate=state.get("sequpdate"))
elif state.get("date_from"):
sequpdate = poller.get_seq_update_dict(date=state.get('date_from'), collection_name=collection).get(collection)
generator = poller.create_update_generator(collection_name=collection, sequpdate=sequpdate)
else:
continue
for portion in generator:
parsed_portion = portion.parse_portion()
save_portion(parsed_portion)
update_generator_config[collection]["sequpdate"] = portion.sequpdate
except InputException as e:
logging.exception("Wrong input: {0}".format(e))
except ConnectionException as e:
logging.exception("Something wrong with connection: {0}".format(e))
except ParserException as e:
logging.exception("Exception occured during parsing: {0}".format(e))
finally:
poller.close_session()
To iterate over received portions from API response, you should follow one of the next iteration logic:
resultId
parameter, which was retrieved from previous response.
Uses common collection name endpoint (apt/threat
) which is added to the base URL >>> /api/v2/apt/threat
.seqUpdate
parameter, which was retrieved from previous response.
Uses updated endpoint (/updated
) after collection name (/apt/threat
) >>> /api/v2/apt/threat/updated
.To search IPs, domains, hashes, emails, etc., you should follow the next logic:
/api/v2/search
endpoint with any q
parameter >>> /api/v2/search?q=8.8.8.8
.
In the output response you will receive collections, which contains the search result (8.8.8.8
).
Use Sequence update iteration as a next step to retrieve all events.To get the latest updates on each collection events you should follow the next logic:
/api/v2/sequnce_list
endpoint with date
and collection
parameters (optional) >>> /api/v2/search?date=2022-01-01&collection=apt/threat
.
In the output response you will receive seqUpdate
number, which you should use in the next request to collection /updated
endpoint.
Use Sequence update iteration as a next step to retrieve all events.Most of the collections at the Threat Intelligence portal has /updated
endpoint.
And this endpoint uses updated logic based on seqUpdate
key field, which comes from API JSON response.
The seqUpdate
key – is a time from Epoch converted to a big number (microseconds), using the next formula:
UTC timestamp * 1000 * 1000.
Note: Don't rely on this formula. Because of the rising amount of data it could be changed.
For that purpose /api/v2/sequence_list
endpoint was created.
Use this endpoint to get required seqUpdate
number.
Each row in our database has its own unique sequence update number. So, we can get all the events one by one.
To check it you can explore JSON output and then explore each item in the "items"
field.
So, each item contains a seqUpdate
field. And the last element’s seqUpdate
is put to the top level of JSON output.
You can use it to get the next portion of feeds.
Each collection has its own updated route like /api/v2/apt/threat/updated
, so we can use the next output as an example.
{
"count": 1761,
"items": [
{"id": "fake286ca753feed3476649438e4e4488"...},
{"id": "fake51d29357b22b80564a1d2f9fc8751"...},
{
"author": null,
"companyId": [],
"id": "fake4f16300296d20ef9b909dc0d354fb",
......,
"indicators": [
{
"dateFirstSeen": null,
"dateLastSeen": null,
"deleted": false,
"description": null,
"domain": "fake-fakesop.net",
"id": "fakebe483bb82759fbee7038235e0f52d0",
.....
}
],
"indicatorsIds": [
"fakebe483bb82759fbee7038235e0f52d0"
],
"isPublished": true,
"isTailored": false,
"labels": [],
"langs": [
"en"
],
"malwareList": [],
......,
"seqUpdate": 16172928022293
},
],
"seqUpdate": 16172928022293
}
To iterate over /api/v2/apt/threat/updated
endpoint data, you need to collect this
field number ("seqUpdate": 16172928022293
) right at the top level of the JSON response,
received from previous request or from /sequnce_list
endpoint.
curl -X 'GET' 'https://<base URL>/api/v2/sequnce_list'
Add gathered seqUpdate
in the next request, using endpoint params.
curl -X 'GET' 'https://<base URL>/api/v2/apt/threat/updated?seqUpdate=16172928022293'
In the received JSON output check the "count": 1751
. ->
Gather seqUpdate
from last feed or at top level ->
Put it in next request ->
curl -X 'GET' 'https://<base URL>/api/v2/apt/threat/updated?seqUpdate=16172928536227'
In the received JSON output, check the "count": 1741
->
Gather seqUpdate
from last feed or at top level ->
Repeat till the end.
The "stop word" in that logic is items "count"
or "items"
list length.
For the collection apt/threat
in above example, the limit
is set to 10 by default,
the other collections usually have 100 limit
. The limit depends on the amount of data to not overload the JSON output.
For example, usually you receive a portion of 100 feeds (not 10) for the first iteration. ->
Then could be a portion of 23 feeds -> Then a portion of 0 feeds -> The end.
Search logic is used to find attribution to the search value in Threat Intelligence database.
To find events related to IP, domain, hash, email, etc., you should send request to the /api/v2/search
endpoint
with any q
parameter (/api/v2/search?q=8.8.8.8
).
It will return a list of collections, which contains this searchable parameter.
As a next step we need to use Sequence update iteration over all items in each collection.
You can specify the searchable type keyword to avoid side results by setting q
parameter like /api/v2/search?q=ip:8.8.8.8
.
The same can be done for domain, email, hash, etc (/api/v2/search?q=domain:google.com
, /api/v2/search?q=email:example@gmail.com
).
[
{
"apiPath": "suspicious_ip/open_proxy",
"label": "Suspicious IP :: Open Proxy",
"link": "https://<base-url>/api/v2/suspicious_ip/open_proxy?q=ip:8.8.8.8",
"count": 14,
"time": 0.304644684,
"detailedLinks": null
},
{
"apiPath": "attacks/ddos",
"label": "Attack :: DDoS",
"link": "https://<base-url>/api/v2/attacks/ddos?q=ip:8.8.8.8",
"count": 1490,
"time": 0.389418291,
"detailedLinks": null
},
{"apiPath": "attacks/deface"...},
{"apiPath": "malware/config"...},
{"apiPath": "suspicious_ip/scanner"...}
]
On the first search step we receive information that collection attacks/ddos
contains 1490 items ("count": 1490
).
Let's extract all of them. First we need to send request to this collection with the q
parameter (?q=ip:8.8.8.8
).
Then we retrieve "seqUpdate"
field right at the top level of the JSON response and use it in the next request ("seqUpdate": 1673373011294
).
{
"count": 1490,
"items": [
{
"body": null,
"cnc": {"cnc": "http://ex-ex.net/drv/"...},
"company": null,
"companyId": null,
"dateBegin": null,
"dateEnd": null,
"dateReg": "2017-08-16T00:00:00+00:00",
"evaluation": {},
"favouriteForCompanies": [],
"headers": [],
"hideForCompanies": [],
"id": "examplec58903baddc84b8c51eaef1f904374025d",
"isFavourite": false,
...
}
],
...,
"seqUpdate": 1673373011294
}
So the next request should look like this /api/v2/attacks/ddos/updated?q=ip:8.8.8.8&seqUpdate=1673373011294
.
We can also set the limit
parameter in the requests, like limit=500
.
Explore the example below.
curl -X 'GET' 'https://<base URL>/api/v2/search?q=ip:8.8.8.8'
Add gathered seqUpdate
in the next request, using endpoint params.
curl -X 'GET' 'https://<base URL>/api/v2/apt/threat/updated?seqUpdate=1673373011294'
In the received JSON output check the "count": 1390
. ->
Gather seqUpdate
from last feed or at top level ->
Put it in next request ->
curl -X 'GET' 'https://<base URL>/api/v2/apt/threat/updated?seqUpdate=1673375930599'
In the received JSON output, check the "count": 1290
->
Gather seqUpdate
from last feed or at top level ->
Repeat till the end.
The "stop word" in that logic is items "count"
or "items"
list length.
For the collection attacks/ddos
in above example, the limit
is set to 100 by default,
the other collections it may differ. The limit depends on the amount of data to not overload the JSON output.
For example, usually you receive a portion of 100 feeds for the first iteration. ->
Then could be a portion of 23 feeds -> Then a portion of 0 feeds -> The end.
Default limit is 100 records per request. Due to different size of feeds there are different limits for getting data.
To change record limit in response add param limit=500
to the request.
All limits for different collections can be found at Portal documentation.
curl -X 'GET' 'https://<base URL>/api/v2/apt/threat/updated?limit=500&seqUpdate=16172928022293'
This code is return if you sent no credentials. Make sure that you send Authorization header and that you use Basic auth.
There are several possible reasons of it:
Try setting a smaller limit when requesting the API.
Have a question? Ask in the SD Ticket on our Portal or cyberintegrationsdev@gmail.com
FAQs
Python library - modules for processing data from the TI and DRP system collected in one library. This library simplifies work with the products API and gives you the flexibility to customize the search and retrieval of data from the system.
We found that cyberintegrations demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.