CAL Classifiers
  • 21 May 2025
  • 8 Minutes to read
  • Dark
    Light

CAL Classifiers

  • Dark
    Light

Article summary

Overview

CAL™ provides anonymized, crowdsourced intelligence derived from global data for Indicators across all participating instances of ThreatConnect®, as well as in Polarity when using the ThreatConnect CAL integration with Polarity. CAL Classifiers are a set of labels applied by CAL to Indicators to represent predefined categorizations derived from CAL’s classification analytics and statistical models. They provide you with a standardized vocabulary for understanding key data points about an Indicator. CAL Classifiers are available for the following Indicator types: Address, ASN, CIDR, Email Address, File, Host, and URL.

Before You Start

User Roles

  • To view CAL Classifiers for Indicators in your Organization, your user account can have any Organization role.
  • To view CAL Classifiers for Indicators in a Community or Source, your user account can have any Community role except Banned for that Community or Source.

Prerequisites

  • To view CAL enrichment information for Indicators in your ThreatConnect owners, enable CAL for your ThreatConnect instance and in your Organization:
    • To enable CAL for your ThreatConnect instance, select the CALEnabled checkbox on the Settings tab of the System Settings screen (must be a System Administrator to perform this action).
    • To enable CAL in your Organization, edit your Organization on the Organizations tab of the Account Settings screen and select the Enable CAL Data checkbox on the Permissions tab of the Organization Information window (must be a System Administrator, Operations Administrator, or Accounts Administrator to perform this action).
  • Verify that your ThreatConnect instance can receive data from cal.threatconnect.com (if using an On Premises instance).

Viewing CAL Classifiers

An Indicator’s CAL Classifiers are displayed on the Indicator’s Details drawer (Figure 1), the Details card on the Overview tab of the Indicator’s Details screen (Figure 2), and the Indicator Analytics card on the Overview tab of the Indicator’s legacy Details screen (Figure 3).

Figure 1_CAL Classifiers_7.9.1

 

Figure 2_CAL Classifiers_7.9.1

 

Figure 3_CAL Classifiers_7.9.1

 

CAL Classifiers Glossary

CAL ClassifierValid Indicator TypesDescription
Active HostHostHost has a sufficient number of reported observations from ThreatConnect users within the allotted timeframe.
ASN.InvalidASNASN does not exist, according to the master list of ASN:CIDR mappings.
CloudHostedURLURL is hosted on a common cloud-hosting domain (e.g., amazonaws.com).
DNSHosts.Excessive.CurrentAddressAddress has an excessive number (3+) of hosts concurrently resolving to it.
DNSHosts.HistoricalResolutionsAddressAddress has had hosts historically resolve to it, but currently no tracked hosts do.
DNSHosts.Malicious.CurrentAddressAddress has a sufficiently evil host that currently resolves to it.
DNSHosts.Malicious.HistoricalAddressAddress has had a sufficiently evil host resolve to it in the last 30 days, but not currently.
DNSHosts.MultipleResolutionsAddressAddress has 2+ hosts currently resolving to it.
DNSRes.Excessive.CurrentHostHost currently resolves to an excessive number (5+) of concurrent IP addresses.
DNSRes.Excessive.HistoricalHostHost has resolved to an excessive number (5+) of concurrent IP addresses in the last 7 days, but does not currently resolve to an excessive number of concurrent IP addresses.
DNSRes.Malicious.CurrentHostHost resolves to an IP address that, as of the current day, is sufficiently evil.
DNSRes.Malicious.HistoricalHostHost resolved in the last 30 days to an IP address that, as of the current day, is sufficiently evil, but does not currently resolve to this IP address.
DNSRes.MultipleResolutionsHostHost currently resolves to 2+ IP addresses.
DNSRes.NoResolutionHostHost does not currently resolve to any IP address.
DNSRes.ParkedHostHost resolves to a currently known-good IP address.
DNSRes.RecentlyUnparkedHostHost resolved to a known-good IP address in the last 7 days, but no longer does.
Email.CommonDomainEmailAddressEmail Address comes from a list of very common/popular email hosting services (e.g., @google.com).
Email.DisposableEmailAddressEmail Address uses an email provider known to be disposable (e.g., badguy@mailinator.com).
Executable.AndroidFileFile hash is known to represent an Android™ executable.
Executable.iOSFileFile hash is known to represent an iOS™ executable.
Executable.LegacyFileFile hash is known to represent a legacy (pre-2000) executable.
Executable.ModernFileFile hash is known to represent a modern-architecture (later than the year 2000) executable.
ExternalUsage.<platform>.HistoricalAddress, ASN, Email Address, Host, URLIndicator has documented historical usage attributed from the ThreatConnect Intelligence Source.
FileType.<platform>.<subplatform>FileThe File’s reputed type, platform, and subplatform.
Host.DGA.SuspectedHostHost may have been generated by a domain generation algorithm (DGA), a tactic frequently employed by malicious actors to create multiple domains to leverage during cyber attacks. This label can be applied via machine learning or through association with a source providing DGA indicators.
Host.DynamicDNSHost, URLIndicator (or its domain) includes a known dynamic DNS provider (e.g., no-ip.com).
Host.ExcessiveLengthHostHost has at least 50 characters.
Host.LoginFraudHostHost includes text similar to common websites (e.g., paypal), along with keywords of interest (e.g., auth, login, secure).
Host.RecentlyRegistered.30DHostHost was registered within the last 30 days.
Host.RecentlyRegistered.7DHostHost was registered within the last 7 days.
Host.SpoofingURLURL contains strings indicative of a spoof attempt (e.g., .com-).
Host.UnicodeHost, URLIndicator contains Unicode characters in the domain name, signified by xn--.
Host.WHOIS.ExpiredHostHost’s most recent WHOIS registration has expired.
Host.WHOIS.LongRegistrationHostHost’s most recent WHOIS registration was for at least 5 years.
Host.WHOIS.ShortRegistrationHostHost’s most recent WHOIS registration was for less than 6 months.
HostedInfrastructure.AWSAddress, Host, URLHost or URL is related to, or Address belongs to, a known Amazon Web Services® (AWS) CIDR block.
HostedInfrastructure.CloudflareAddress, Host, URLHost or URL is related to, or Address belongs to, a known Cloudflare® CIDR block.
HostedInfrastructure.FacebookAddress, Host, URLHost or URL is related to, or Address belongs to, a known Facebook™ CIDR block.
HostedInfrastructure.GoogleAddress, Host, URLHost or URL is related to, or Address belongs to, a known Google® CIDR block.
HostedInfrastructure.MaxCDNAddress, Host, URLHost or URL is related to, or Address belongs to, a known MaxCDN (legacy service owned by Akamai®) CIDR block.
HostedInfrastructure.MicrosoftAddress, Host, URLHost or URL is related to, or Address belongs to, a known Microsoft® CIDR block.
HostedInfrastructure.TwitterAddress, Host, URLHost or URL is related to, or Address belongs to, a known X™ (formerly Twitter®) CIDR block.
IntrusionPhase.<value>.CurrentAddress, Email Address, File, Host, URLIndicator has a documented Intrusion Phase (e.g., C2) Attribute from the ThreatConnect Intelligence Source within allotted timeframe (by Indicator type).
IntrusionPhase.<value>.HistoricalAddress, Email Address, File, Host, URLIndicator has a documented Intrusion Phase (e.g., C2) Attribute from the ThreatConnect Intelligence Source outside allotted timeframe (by Indicator type).
LikelyPythonScriptHostHost appears to be a mislabeled Python® file rather than a legitimate Host.
Malware.<type>FileFile has reputation with a specific type of malware.
MultipleSuspiciousURLsHostHost has 2 or more suspicious URLs associated with it.
Observations.HighAddress, Email Address, File, Host, URLIndicator has a high number of observations for its type.
Observations.LowAddress, Email, File, Host, URLIndicator has a low number of observations for its type.
Observations.MedAddress, Email Address, File, Host, URLIndicator has a moderate number of observations for its type.
PrivateNetworkAddressAddress belongs to a netblock known as a private address space (e.g., 192.168.0.0/16).
ProxyRegistrationEmail AddressEmail Address uses an email provider that provides proxy registration (e.g., badguy@domainsbyproxy.com).
Quad9.Geo.Recent.<country name>HostQuad9® Host with a country label has been last seen by CAL within last 7 days.
Quad9.Geo.Historical.<country name>HostQuad9 Host with a country label was last seen by CAL prior to the last 7 days.
Quad9.HighVolume.30DHostHost has seen significant DNS lookups through Quad9 in the last 30 days.
Quad9.HighVolume.7DHostHost has seen significant DNS lookups through Quad9 in the last 7 days.
Quad9.RecentLookups.30DHostHost has been actively resolved through Quad9 DNS in the last 30 days.
Quad9.RecentLookups.7DHostHost has been actively resolved through Quad9 DNS in the last 7 days.
Rank.CiscoUmbrella.Top1MHostHost is in Cisco Umbrella™’s Top 1 Million domain list, in the 100,001–1,000,000 spot.
Rank.CiscoUmbrella.Top100KHostHost is in Cisco Umbrella’s Top 1 Million domain list, in the 10,001–100,000 spot.
Rank.CiscoUmbrella.Top10KHostHost is in Cisco Umbrella’s Top 1 Million domain list, in the 1,001–10,000 spot.
Rank.CiscoUmbrella.Top1KHostHost is in Cisco Umbrella’s Top 1 Million domain list, in the 101–1,000 spot.
Rank.CiscoUmbrella.Top100HostHost is in Cisco Umbrella’s Top 1 Million domain list, in the 1–100 spot.
Rank.Majestic.Top1MHostHost is in Majestic’s Top 1 Million domain list, in the 100,001–1,000,000 spot.
Rank.Majestic.Top100KHostHost is in Majestic’s Top 1 Million domain list, in the 10,001–100,000 spot.
Rank.Majestic.Top10KHostHost is in Majestic’s Top 1 Million domain list, in the 1,001–10,000 spot.
Rank.Majestic.Top1KHostHost is in Majestic’s Top 1 Million domain list, in the 101–1,000 spot.
Rank.Majestic.Top100HostHost is in Majestic’s Top 1 Million domain list, in the 1–100 spot.
Rank.Tranco.Top1MHostHost is in Tranco’s Top 1 Million domain list, in the 100,001–1,000,000 spot.
Rank.Tranco.Top100KHostHost is in Tranco’s Top 1 Million domain list, in the 10,001–100,000 spot.
Rank.Tranco.Top10KHostHost is in Tranco’s Top 1 Million domain list, in the 1,001–10,000 spot.
Rank.Tranco.Top1KHostHost is in Tranco’s Top 1 Million domain list, in the 101–1,000 spot.
Rank.Tranco.Top100HostHost is in Tranco’s Top 1 Million domain list, in the 1–100 spot.
Rel.Addresses.MaliciousCIDR, ASNASN address provider or CIDR range has a high number of malicious IP addresses.
Rel.EmailAddresses.SuspiciousHostHost has a sufficient number of related email addresses that are sufficiently evil.
Rel.Host.KnownGoodURLURL is related to a known-good host.
Rel.Host.SuspiciousEmail AddressEmail Address has an email provider host that is known to be sufficiently evil.
Rel.Hosts.MaliciousCIDRA high number of malicious hosts currently resolve within this CIDR range.
Rel.NSClients.MaliciousHostHost is currently being used as a nameserver by a high proportion of malicious hosts.
Rel.NSClients.SuspiciousHostHost is currently being used as a nameserver by a substantial number of suspicious hosts.
Rel.Subdomains.SuspiciousHostHost has a sufficient number of subdomains that are sufficiently evil.
Rel.URL.SuspiciousHostHost is associated with at least one suspicious URL.
Rel.URLs.MaliciousCIDRA high number of malicious URLs currently resolve within this CIDR range.
Rel.URLs.MultipleQueriesAddressAddress has recently been observed hosting a large number of URLs that have multiple queries.
Status.SafelistAddress, ASN, Email Address, Host, URLIndicator is on the CAL Safelist, a manually curated list maintained for the ThreatConnect community.
Status.SinkholedHostHost is currently believed to be sinkholed, based on its nameserver.
Subdomains.HighCountHostHost has at least 4 subdomains (regex implementation with known flaw—e.g., .co.uk).
Suspicious.ExcessiveSubdomainsHostHost has at least 4 subdomains [excluding multilevel top-level domains (TLDs) such as .co.uk].
TLD.AlternativeDNSHostHost has a TLD from a list of alternative DNS providers.
TLD.DarkWebHost, URLIndicator (or its domain) ends in .onion.
TLD.InvalidHostHost does not have a valid TLD from the public suffix list.
TLD.RiskyHost, URLIndicator uses a TLD that is considered risky (e.g., bad.ru).
TLD.UncommonHostHost does not contain the “common” TLD flags, such as .com, .net, etc.
TorExitNodeAddressAddress comes from the Tor Exit Nodes feed.
Trending.ImpressionsAddress, Email Address, File, Host, URL, ASN, CIDRIndicator has a sufficient number of impressions in the last day or week.
Trending.ObservationsAddress, Email Address, File, Host, URL, ASN, CIDRIndicator has a sufficient number of observations in the last week.
URLShortenerURLURL uses a domain associated with URL shortening services.
Usage.<value>.CurrentAddress, Host, URLIndicator has a documented Usage (e.g., VulnerabilityScan) Attribute from the ThreatConnect Intelligence Source within allotted timeframe (by Indicator type).
Usage.<value>.HistoricalAddress, Host, URLIndicator has a documented Usage (e.g., VulnerabilityScan) Attribute from the ThreatConnect Intelligence Source outside allotted timeframe (by Indicator type).
Usage.CDNAddressAddress has been reported by an external feed as serving content delivery network (CDN) functions.
Usage.DedicatedServer.SuspectedAddress, Host, URLBased on ThreatConnect’s observations, Address is known to host only one domain, or Host or URL is known to have only one IP address.
Usage.DNSAddressAddress has been reported by an external feed as serving DNS functions.
Usage.Nameserver.BoutiqueHostHost is currently being observed as a nameserver by only a small number of host clients.
Usage.Nameserver.CommonHostHost is currently being used as a nameserver by a high number of other hosts and is likely to be benign.
Usage.Nameserver.CurrentHostHost is currently being used as a nameserver by other hosts.
Usage.Nameserver.SelfRefHostHost is currently using itself as a nameserver.
Usage.SinkholeHostHost is suspected to be operating as a sinkhole by its owner.
WebExtension.ExecutableURLURL ends in a suffix implying an executable file.

ThreatConnect® is a registered trademark, and CAL™ is a trademark, of ThreatConnect, Inc.
Akamai® is a registered trademark of Akamai Technologies, Inc.
Amazon Web Services® is a registered trademark of Amazon Web Services, Inc.
Cisco Umbrella™ and iOS™ are trademarks of Cisco Systems, Inc.
Cloudflare® is a registered trademark of Cloudflare, Inc.
Google® is a registered trademark, and Android™ is a trademark, of Google LLC.
Facebook™ is a trademark of Meta Platforms, Inc.
Microsoft® is a registered trademark of Microsoft Corporation.
Python® is a registered trademark of Python Software Foundation.
Quad9® is a registered trademark of Quad9 Foundation.
Twitter® is a registered trademark of Twitter, Inc.
X™ is a trademark of X Corp.

20094-01 v.04.A


Was this article helpful?