[DEPRECATED] Discover and Search

This page has been deprecated. Find the latest documentation here.

The Discover and Search feature allows security professionals to find more information and IOCs about all the threats detected by Blue Hexagon. The “Search" feature allows users of Blue Hexagon search threats and the context round threats using an “Elasticsearch Lucene”-like query language. The “Discover" feature provides users with a history of all the detections with the ability to view and investigate all the data Blue Hexagon has analyzed, including threats and benign files. In addition, using syslog, organizations can easily integrate this threat intelligence their SIEM/analytics platform.

Query Syntax & Usage

Discover supports several types of queries. These are described below with examples. The search queries should be directly entered in the field next to the magnifying glass near the top of the page.

Navigating to the Discover page

 

 

 

Selecting columns to display

 

Search Syntax with Operators and Examples

Operation

Operator Symbol

Example

Notes

word search

string

gmail

Search for items with the string

“gmail” in any field

Search

:

filetype:PDF

Files of type PDF

NOT

-

-filetype:PDF

Not files for type PDF

OR

OR

filetype:PDF OR filetype:DLL

Files of type PDF OR DLL

AND

AND

filetype:PDF AND source:HTTP

Files of type PDF downloaded via

HTTP

Grouping

(...)

(filetype:PDF OR filetype:DLL) AND

source:HTTP



Files of type PDF or DLL

downloaded via HTTP

IP CIDR

CIDR

notation

orig_h:\"172.22.9.0/24\"



Traffic seen by endpoints in the

172.22.9.0/24 subnet. Can be used

for orig_h (Destination IP) and

resp_h (Source IP) fields. Note that

the quotes must be escaped.



 

 

 

 

Numeric

:

filesize:22016

Files of size 22016 bytes

<, >, <=, >=

filesize:<=22016

All files size less than or equal to

22016 bytes



OR, AND

filesize:(>22016 AND <23000)

All files size greater than 22016

bytes and less than 23000 bytes


Metadata

Display Label

Field to use in Search Query

Field Type

Description

Anonymizable?

Action Taken

actions

string

Actions taken in response to threat detection (e.g. Send to EDR)

No

Ancestors

ancestors

string

ARCHIVE: Comma-separated list of file hashes indicating the lineage of the file inside an archive

No

Appliance

appliance

string

Appliance identifier e.g. “hq”. Each Blue Hexagon appliance in your network is assigned a unique id.

No

BH Id

bhid

string

Unique identifier for a single file instance

No

Category

category

string

Threat Category (e.g. information stealer, ransomware)

No

Descendants

descendants

string

ARCHIVE: Comma-separated list of file hashes indicating the files contained in an archive

No

Destination IP

orig_h

IP

Originating endpoint’s IP address (client endpoint)

Yes

Family

family

string

Threat Family (to be read in conjunction with Threat Category)

No

Filename

filename

string

Name of file, if available

Yes

Filesize(Bytes)

filesize

integer

Size of the file in bytes

No

Filetype

filetype

string

File type (e.g. EXE, PDF, MS-DOC)

No

SHA256

hash

string

SHA256 hash of the file

No

HTTP Host

http_host

string

HTTP Host header

Yes

HTTP Method

http_method

string

HTTP Request verb: GET, POST, etc.

Yes

HTTP Response MIME

http_resp_mime_type

string

HTTP Response mime_type (e.g. application/pdf)

Yes

HTTP Status Code

http_status_code

string

Status code returned by the server

Yes

HTTP URI

http_uri

string

URI used in the HTTP request

Yes

HTTP User Agent

http_user_agent

string

Value of the User-Agent header

Yes

MIME type

mime_type

string

mime_type of file payload (e.g. application/pdf)

No

Multi Category

multi_category

nested,float

For each threat, score associated with various threat categories

No

Destination Port

orig_p

integer

Originating endpoint’s TCP/UDP port (or ICMP code)

Yes

Verdict

prediction

string

Threat verdict - benign or malicious

No

Source Port

resp_p

integer

Responding endpoint’s TCP/UDP port (or ICMP code)

Yes

Neural Verdict Time(ms)

response_time

integer

Time taken by BlueHex appliance to deliver verdict (in milliseconds)

No

Severity

severity

integer

Severity level of the threat (1-7)

No

SMTP CC

smtp_cc

string

Contents of the SMTP CC header

Yes (default)

SMTP First Received

smtp_first_received

string

Contents of the SMTP first Received header

Yes

SMTP From

smtp_from

string

Contents of the SMTP FROM header

Yes (default)

SMTP In Reply To

smtp_in_reply_to

string

Contents of the SMTP In-Reply-To header

Yes (default)

SMTP Mail From

smtp_mailfrom

string

Contents of the SMTP MAIL FROM header

Yes (default)

SMTP Path

smtp_path

string

Message transmission path, from headers

Yes

SMTP Reply

smtp_reply_to

string

Contents of the SMTP ReplyTo header

Yes (default)

SMTP To

smtp_to

string

Contents of the SMTP TO header

Yes (default)

SMTP X Originating IP

smtp_x_originating_ip

string

Contents of the SMTP X-Originating-IP header

Yes

Protocol

source

string

Source protocol of the file data (HTTP/SMTP/FTP_DATA)

No

Source Country

source_country

string

Country corresponding to Source IP

Yes

Source IP

resp_h

IP

Responding endpoint’s IP address (typically HTTP or SMTP server)

Yes

Threat Type

threat_type

string

Type of threat: payload malware, C&C, etc.

No

Kill Chain Stage

tkc_stage

integer

Threat Kill Chain stage (1-7)

No

Timestamp

ts

date

UTC timestamp (seconds since epoch with microsecond precision)

No





Blue Hexagon Proprietary