Integrate Google Threat Intelligence with Google SecOps

This document explains how to integrate Google Threat Intelligence with Google Security Operations (Google SecOps).

Integration version: 1.0

Before you begin

To use the integration, you need an API key. For more information, see Google Threat Intelligence API keys

Integration parameters

The Google Threat Intelligence integration requires the following parameters:

Parameter Description
API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value is https://www.virustotal.com .

API Key

Required.

The Google Threat Intelligence API key.

ASM Project Name

Optional.

The Mandiant Attack Surface Management (ASM) project name to use in the integration. This parameter is required to run the Search ASM Entities , Search ASM Issues and Update ASM Issue actions.

If no value is set, only alerts from collections in the primary project are returned.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server.

Selected by default.

For instructions about how to configure an integration in Google SecOps, see Configure integrations .

You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances .

Actions

For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action .

Add Comment To Entity

Use the Add Comment To Entityaction to add comments to Google SecOps entities in Google Threat Intelligence.

This action only supports the MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • File Hash
  • Hostname
  • IP Address
  • URL

Action inputs

The Add Comment To Entityaction requires the following parameters:

Parameter Description
Comment

Required.

A comment to add to all supported entities.

Action outputs

The Add Comment To Entityaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result outputs received when using the Add Comment To Entityaction:

  { 
  
 "Status" 
 : 
  
 "Done" 
 } 
 
  { 
  
 "Status" 
 : 
  
 "Not done" 
 } 
 
Output messages

The Add Comment To Entityaction can return the following output messages:

Output message Message description

Successfully added comments to the following entities in Google Threat Intelligence: ENTITY_ID .

The action wasn't able to add comments to the following entities in Google Threat Intelligence: ENTITY_ID .

No comments were added to the provided entities in Google Threat Intelligence.

The action succeeded.
Error executing action "Add Comment To Entity". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Add Comment To Entityaction:

Script result name Value
is_success True or False

Add Vote To Entity

Use the Add Comment To Entityaction to add votes to Google SecOps entities in Google Threat Intelligence.

This action only supports the MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • File Hash
  • Hostname
  • IP Address
  • URL

Action inputs

The Add Vote To Entityaction requires the following parameters:

Parameter
Description
Vote

Required.

A vote to add to all supported entities.

The possible values are as follows:

  • Harmless
  • Malicious

The default value is Malicious .

Action outputs

The Add Vote To Entityaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Add Vote To Entityaction:

  { 
  
 "Status" 
 : 
  
 "Done" 
 } 
 
  { 
  
 "Status" 
 : 
  
 "Not done" 
 } 
 
Output messages

The Add Vote To Entityaction can return the following output messages:

Output message Message description

Successfully added votes to the following entities in Google Threat Intelligence: ENTITY_ID .

Action wasn't able to add votess to the following entities in Google Threat Intelligence: ENTITY_ID .

No votes were added to the provided entities in Google Threat Intelligence.

The action succeeded.
Error executing action "Add Vote To Entity". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Add Vote To Entityaction:

Script result name Value
is_success True or False

Download File

Use the Download Fileaction to download a file from Google Threat Intelligence.

This action runs on the Google SecOps Hash entity.

This action only supports the MD5, SHA-1, and SHA-256 hashes.

Action inputs

The Download Fileaction requires the following parameters:

Parameter Description
Download Folder Path

Required.

The path to the folder to store downloaded files.

Overwrite

Required.

If selected, the action overwrites an existing file with the new file if the filenames are identical.

Selected by default.

Action outputs

The Download Fileaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Download Fileaction:

  { 
  
 "absolute_file_paths" 
 : 
  
 [ 
 "file_path_1" 
 , 
 "file_path_2" 
 ] 
 } 
 
Output messages

The Download Fileaction can return the following output messages:

Output message Message description

Successfully downloaded related files for the following entities in Google Threat Intelligence: ENTITY_ID .

No related files were found for the following entities in Google Threat Intelligence: ENTITY_ID .

No related files were found for the provided entities in Google Threat Intelligence.

The action succeeded.
Error executing action "Download File". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Enrich Entities

Use the Enrich Entitiesaction to enrich entities with information from Google Threat Intelligence.

This action supports the MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • Hash
  • Hostname
  • IP Address
  • URL
  • CVE
  • Threat Actor

Action inputs

The Enrich Entitiesaction requires the following parameters:

Parameter
Description
Resubmit Entity

Optional.

If selected, the action resubmits entities for analysis instead of using the entity information from the previous action run.

This parameter only supports the URL and Hash entities.

Not selected by default.

Resubmit After (Days)

Optional.

The number of days for the action to wait before submitting the entity again. To use this parameter, select the Resubmit Entity parameter.

The default value is 30 .

This parameter only supports the URL and Hash entities.

Sandbox

Optional.

A comma-separated list of sandbox names to analyze, such as VirusTotal Jujubox, VirusTotal ZenBox, Microsoft Sysinternals, Tencent HABO .

This parameter only supports the Hash entity.

If you don't set this parameter, the action uses the default sandbox, which is VirusTotal Jujubox .

Retrieve Sandbox Analysis

Optional.

If selected, the action retrieves the sandbox analysis for the entity and creates a separate section for every sandbox in the JSON result.

The action returns data for sandboxes that you configured in the Sandbox parameter.

This parameter only supports the Hash entity.

Not selected by default.

Fetch MITRE Details

Optional.

If selected, the action returns information about the related MITRE techniques and tactics.

This parameter only supports the Hash entity.

Not selected by default.

Lowest MITRE Technique Severity

Optional.

The lowest MITRE technique severity to return.

The action treats the Unknown severity as Info .

This parameter only supports the Hash entity.

The possible values are as follows:

  • High
  • Medium
  • Low
  • Info

The default value is Medium .

Retrieve Comments

Optional.

If selected, the action retrieves comments about the entity.

This parameter supports the following entities:

  • Domain
  • Hash
  • Hostname
  • IP Address
  • URL
Max Comments To Return

Optional.

The maximum number of comments to return for every action run.

The default value is 10 .

Action outputs

The Enrich Entitiesaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Available
Case wall table Not available
Entity enrichment table Available
JSON result Available
Output messages Available
Script result. Available

The Enrich Entitiesaction can return the following links:

  • IOC: https://www.virustotal.com/gui/ ENTITY_TYPE / ENTITY /detection

  • Threat actor: https://www.virustotal.com/gui/collection/threat-actor-- ID

  • Vulnerability: https://www.virustotal.com/gui/collection/vulnerability-- ID

Entity enrichment table
  1. The Enrich Entities action support the following entity enrichment for IP addresses :
  2. Enrichment field Source (JSON key) Applicability
    GTI_id
    id When available in the JSON result.
    GTI_owner
    as_owner When available in the JSON result.
    GTI_asn
    asn When available in the JSON result.
    GTI_continent
    continent When available in the JSON result.
    GTI_country
    country When available in the JSON result.
    GTI_harmless_count
    last_analysis_stats/harmless When available in the JSON result.
    GTI_malicious_count
    last_analysis_stats/malicious When available in the JSON result.
    GTI_suspicious_count
    last_analysis_stats/suspicious When available in the JSON result.
    GTI_undetected_count
    last_analysis_stats/undetected When available in the JSON result.
    GTI_certificate_valid_not_after
    validity/not_after When available in the JSON result.
    GTI_certificate_valid_not_before
    validity/not_before When available in the JSON result.
    GTI_reputation
    reputation When available in the JSON result.
    GTI_tags
    Comma-separated list of tags When available in the JSON result.
    GTI_malicious_vote_count
    total_votes/malicious When available in the JSON result.
    GTI_harmless_vote_count
    total_votes/harmless When available in the JSON result.
    GTI_report_link
    report_link When available in the JSON result.
    GTI_widget_link
    widget_url When available in the JSON result.
    GTI_threat_score
    gti_assessment.threat_score.value When available in the JSON result.
    GTI_severity
    gti_assessment.severity.value When available in the JSON result.
    GTI_normalised_categories
    CSV of gti_assessment.contributing_factors.normalised_categories When available in the JSON result.
    GTI_verdict
    gti_assessment.verdict.value When available in the JSON result.
    GTI_description
    gti_assessment.description When available in the JSON result.
  3. The Enrich Entities action support the following entity enrichment for URL :
  4. Enrichment field Source (JSON key) Applicability
    GTI_id
    id When available in the JSON result.
    GTI_title
    title When available in the JSON result.
    GTI_last_http_response_code
    last_http_response_code When available in the JSON result.
    GTI_last_http_response_content_length
    last_http_response_content_length When available in the JSON result.
    GTI_threat_names
    Comma-separated list of threat_names When available in the JSON result.
    GTI_harmless_count
    last_analysis_stats/harmless When available in the JSON result.
    GTI_malicious_count
    last_analysis_stats/malicious When available in the JSON result.
    GTI_suspicious_count
    last_analysis_stats/suspicious When available in the JSON result.
    GTI_undetected_count
    last_analysis_stats/undetected When available in the JSON result.
    GTI_reputation
    reputation When available in the JSON result.
    GTI_tags
    Comma-separated list of tags When available in the JSON result.
    GTI_malicious_vote_count
    total_votes/malicious When available in the JSON result.
    GTI_harmless_vote_count
    total_votes/harmless When available in the JSON result.
    GTI_report_link
    report_link When available in the JSON result.
    GTI_widget_link
    widget_url When available in the JSON result.
    GTI_threat_score
    gti_assessment.threat_score.value When available in the JSON result.
    GTI_severity
    gti_assessment.severity.value When available in the JSON result.
    GTI_normalised_categories
    CSV of gti_assessment.contributing_factors.normalised_categories When available in the JSON result.
    GTI_verdict
    gti_assessment.verdict.value When available in the JSON result.
    GTI_description
    gti_assessment.description When available in the JSON result.
    GTI_category_{attributes/categories/json key}
    {attributes/categories/json key value} When available in the JSON result.
  5. The Enrich Entities action support the following entity enrichment for Hash :
  6. Enrichment field Source (JSON key) Applicability
    GTI_id
    id When available in the JSON result.
    GTI_magic
    magic When available in the JSON result.
    GTI_md5
    md5 When available in the JSON result.
    GTI_sha1
    sha1 When available in the JSON result.
    GTI_sha256
    sha256 When available in the JSON result.
    GTI_ssdeep
    ssdeep When available in the JSON result.
    GTI_tlsh
    tlsh When available in the JSON result.
    GTI_vhash
    vhash When available in the JSON result.
    GTI_meaningful_name
    meaningful_name When available in the JSON result.
    GTI_magic
    Comma-separated list of names When available in the JSON result.
    GTI_harmless_count
    last_analysis_stats/harmless When available in the JSON result.
    GTI_malicious_count
    last_analysis_stats/malicious When available in the JSON result.
    GTI_suspicious_count
    last_analysis_stats/suspicious When available in the JSON result.
    GTI_undetected_count
    last_analysis_stats/undetected When available in the JSON result.
    GTI_reputation
    reputation When available in the JSON result.
    GTI_tags
    Comma-separated list of tags When available in the JSON result.
    GTI_malicious_vote_count
    total_votes/malicious When available in the JSON result.
    GTI_harmless_vote_count
    total_votes/harmless When available in the JSON result.
    GTI_report_link
    report_link When available in the JSON result.
    GTI_widget_link
    widget_url When available in the JSON result.
    GTI_threat_score
    gti_assessment.threat_score.value When available in the JSON result.
    GTI_severity
    gti_assessment.severity.value When available in the JSON result.
    GTI_normalized_categories
    CSV of gti_assessment.contributing_factors.normalised_categories When available in the JSON result.
    GTI_verdict
    gti_assessment.verdict.value When available in the JSON result.
    GTI_description
    gti_assessment.description When available in the JSON result.
    GTI_exiftool_{json_key}
    GTI_exiftool_{json_key.value}
  7. The Enrich Entities action support the following entity enrichment for Domain/Hostname :
  8. Enrichment field Source (JSON key) Applicability
    GTI_id
    id When available in the JSON result.
    GTI_harmless_count
    last_analysis_stats/harmless When available in the JSON result.
    GTI_malicious_count
    last_analysis_stats/malicious When available in the JSON result.
    GTI_suspicious_count
    last_analysis_stats/suspicious When available in the JSON result.
    GTI_undetected_count
    last_analysis_stats/undetected When available in the JSON result.
    GTI_reputation
    reputation When available in the JSON result.
    GTI_tags
    Comma-separated list of tags When available in the JSON result.
    GTI_malicious_vote_count
    total_votes/malicious When available in the JSON result.
    GTI_harmless_vote_count
    total_votes/harmless When available in the JSON result.
    GTI_report_link
    report_link When available in the JSON result.
    GTI_widget_link
    widget_url When available in the JSON result.
    GTI_threat_score
    gti_assessment.threat_score.value When available in the JSON result.
    GTI_severity
    gti_assessment.severity.value When available in the JSON result.
    GTI_normalized_categories
    CSV of gti_assessment.contributing_factors.normalised_categories When available in the JSON result.
    GTI_verdict
    gti_assessment.verdict.value When available in the JSON result.
    GTI_description
    gti_assessment.description When available in the JSON result.
    GGTI_category_{attributes/categories/json key}
    {attributes/categories/json key value} When available in the JSON result.
  9. The Enrich Entities action support the following entity enrichment for Threat Actor :
  10. Enrichment field Source (JSON key) Applicability
    GTI_motivations
    Csv of motivations/name When available in the JSON result.
    GTI_aliases
    Csv of alt_names_details/value When available in the JSON result.
    GTI_industries
    Csv of targeted_industries/value When available in the JSON result.
    GTI_malware
    Csv of malware/name When available in the JSON result.
    GTI_source_region
    CSV of source_regions_hierarchy/country When available in the JSON result.
    GTI_target_region
    Csv of targeted_regions_hierarchy/country When available in the JSON result.
    GTI_origin
    origin When available in the JSON result.
    GTI_description
    description When available in the JSON result.
    GTI_last_activity_time
    last_activity_time When available in the JSON result.
    GTI_report_link
    We craft it. When available in the JSON result.
  11. The Enrich Entities action support the following entity enrichment for Vulnerability :
  12. Enrichment field Source (JSON key) Applicability
    GTI_sources
    Csv of source_name When available in the JSON result.
    GTI_exploitation_state
    exploitation_state When available in the JSON result.
    GTI_date_of_disclosure
    date_of_disclosure When available in the JSON result.
    GTI_vendor_fix_references
    vendor_fix_references/url When available in the JSON result.
    GTI_exploitation_vectors
    Csv of exploitation_vectors When available in the JSON result.
    GTI_description
    description When available in the JSON result.
    GTI_risk_rating
    risk_rating When available in the JSON result.
    GTI_available_mitigation
    CSV of available_mitigation When available in the JSON result.
    GTI_exploitation_consequence
    exploitation_consequence When available in the JSON result.
    GTI_report_link
    We craft it. When available in the JSON result.
JSON result

The following example shows the JSON result output received when using the Enrich Entitiesaction:

  { 
  
 [ 
  
 { 
  
 "Entity" 
 : 
  
 " ENTITY_ID 
" 
 , 
  
 "EntityResult" 
 : 
  
 { 
  
 "is_risky" 
 : 
  
 true 
 , 
  
  
 "attributes" 
 : 
  
 { 
  
 "authentihash" 
 : 
  
 " HASH_VALUE 
" 
 , 
  
 "creation_date" 
 : 
  
 1410950077 
 , 
  
 "downloadable" 
 : 
  
 true 
 , 
  
 "exiftool" 
 : 
  
 { 
  
 "CharacterSet" 
 : 
  
 "Unicode" 
 , 
  
 "CodeSize" 
 : 
  
 "547xx" 
 , 
  
 "CompanyName" 
 : 
  
 "MySQL, AB" 
 , 
  
 "EntryPoint" 
 : 
  
 "0x39xx" 
 , 
  
 "FileDescription" 
 : 
  
 "WinMerge Shell Integration" 
 , 
  
 "FileFlagsMask" 
 : 
  
 "0x00xx" 
 , 
  
 "FileOS" 
 : 
  
 "Windows NT 32-bit" 
 , 
  
 "FileSubtype" 
 : 
  
 "0" 
 , 
  
 "FileType" 
 : 
  
 "Win32 EXE" 
 , 
  
 "FileTypeExtension" 
 : 
  
 "exe" 
 , 
  
 "FileVersion" 
 : 
  
 "1.0.1.6" 
 , 
  
 "FileVersionNumber" 
 : 
  
 "1.0.1.6" 
 , 
  
 "ImageFileCharacteristics" 
 : 
  
 "Executable, 32-bit" 
 , 
  
 "ImageVersion" 
 : 
  
 "0.0" 
 , 
  
 "InitializedDataSize" 
 : 
  
 "199168" 
 , 
  
 "InternalName" 
 : 
  
 "ShellExtension" 
 , 
  
 "LanguageCode" 
 : 
  
 "English (U.S.)" 
 , 
  
 "LegalCopyright" 
 : 
  
 "Copyright 2003-2013" 
 , 
  
 "LinkerVersion" 
 : 
  
 "10.0" 
 , 
  
 "MIMEType" 
 : 
  
 "application/octet-stream" 
 , 
  
 "MachineType" 
 : 
  
 "Intel 386 or later, and compatibles" 
 , 
  
 "OSVersion" 
 : 
  
 "5.1" 
 , 
  
 "ObjectFileType" 
 : 
  
 "Executable application" 
 , 
  
 "OriginalFileName" 
 : 
  
 "ShellExtension" 
 , 
  
 "PEType" 
 : 
  
 "PE32" 
 , 
  
 "ProductName" 
 : 
  
 "ShellExtension" 
 , 
  
 "ProductVersion" 
 : 
  
 "1.0.1.6" 
 , 
  
 "ProductVersionNumber" 
 : 
  
 "1.0.1.6" 
 , 
  
 "Subsystem" 
 : 
  
 "Windows GUI" 
 , 
  
 "SubsystemVersion" 
 : 
  
 "5.1" 
 , 
  
 "TimeStamp" 
 : 
  
 "2014:09:17 10:34:37+00:00" 
 , 
  
 "UninitializedDataSize" 
 : 
  
 "0" 
  
 }, 
  
 "first_submission_date" 
 : 
  
 1411582812 
 , 
  
 "last_analysis_date" 
 : 
  
 1606903659 
 , 
  
 "last_analysis_results" 
 : 
  
 { 
  
 "ALYac" 
 : 
  
 { 
  
 "category" 
 : 
  
 "malicious" 
 , 
  
 "engine_name" 
 : 
  
 "ALYac" 
 , 
  
 "engine_update" 
 : 
  
 "20201202" 
 , 
  
 "engine_version" 
 : 
  
 "1.1.1.5" 
 , 
  
 "method" 
 : 
  
 "blacklist" 
 , 
  
 "result" 
 : 
  
 "Trojan.Foreign.Gen.2" 
  
 } 
  
 }, 
  
 "last_analysis_stats" 
 : 
  
 { 
  
 "confirmed-timeout" 
 : 
  
 0 
 , 
  
 "failure" 
 : 
  
 0 
 , 
  
 "harmless" 
 : 
  
 0 
 , 
  
 "malicious" 
 : 
  
 61 
 , 
  
 "suspicious" 
 : 
  
 0 
 , 
  
 "timeout" 
 : 
  
 0 
 , 
  
 "type-unsupported" 
 : 
  
 5 
 , 
  
 "undetected" 
 : 
  
 10 
  
 }, 
  
 "last_modification_date" 
 : 
  
 1606911051 
 , 
  
 "last_submission_date" 
 : 
  
 1572934476 
 , 
  
 "magic" 
 : 
  
 "PE32 executable for MS Windows (GUI) Intel 80386 32-bit" 
 , 
  
 "md5" 
 : 
  
 " MD5_HASH_VALUE 
" 
 , 
  
 "meaningful_name" 
 : 
  
 "ShellExtension" 
 , 
  
 "names" 
 : 
  
 [ 
  
 "ShellExtension" 
 , 
  
 "ZeuS_binary_ MD5_HASH_VALUE 
.exe" 
 , 
  
 " MD5_HASH_VALUE 
.exe" 
 , 
  
 " MD5_HASH_VALUE 
" 
 , 
  
 "2420800" 
 , 
  
 " FILE_ID 
.exe" 
 , 
  
 " NAME 
.exe" 
 , 
  
 " NAME 
.exe" 
  
 ], 
  
 "reputation" 
 : 
  
 -49 
 , 
  
 "sha1" 
 : 
  
 " SHA1_HASH_VALUE 
" 
 , 
  
 "sha256" 
 : 
  
 " SHA256_HASH_VALUE 
" 
 , 
  
 "sigma_analysis_stats" 
 : 
  
 { 
  
 "critical" 
 : 
  
 0 
 , 
  
 "high" 
 : 
  
 0 
 , 
  
 "low" 
 : 
  
 4 
 , 
  
 "medium" 
 : 
  
 0 
  
 }, 
  
 "sigma_analysis_summary" 
 : 
  
 { 
  
 "Sigma Integrated Rule Set (GitHub)" 
 : 
  
 { 
  
 "critical" 
 : 
  
 0 
 , 
  
 "high" 
 : 
  
 0 
 , 
  
 "low" 
 : 
  
 4 
 , 
  
 "medium" 
 : 
  
 0 
  
 } 
  
 }, 
  
 "signature_info" 
 : 
  
 { 
  
 "copyright" 
 : 
  
 "Copyright 2003-2013" 
 , 
  
 "description" 
 : 
  
 "WinMerge Shell Integration" 
 , 
  
 "file version" 
 : 
  
 "1.0.1.6" 
 , 
  
 "internal name" 
 : 
  
 "ShellExtension" 
 , 
  
 "original name" 
 : 
  
 "ShellExtension" 
 , 
  
 "product" 
 : 
  
 "ShellExtension" 
  
 }, 
  
 "size" 
 : 
  
 254976 
 , 
  
 "ssdeep" 
 : 
  
 "6144:Gz90qLc1zR98hUb4UdjzEwG+vqAWiR4EXePbix67CNzjX:Gz90qLc1lWhUbhVqxxxx" 
 , 
  
 "tags" 
 : 
  
 [ 
  
 "peexe" 
 , 
  
 "runtime-modules" 
 , 
  
 "direct-cpu-clock-access" 
  
 ], 
  
 "times_submitted" 
 : 
  
 8 
 , 
  
 "tlsh" 
 : 
  
 "T1DB44CF267660D833D0DF94316C75C3F9673BFC2123215A6B6A4417699E307Exxxx" 
 , 
  
 "total_votes" 
 : 
  
 { 
  
 "harmless" 
 : 
  
 2 
 , 
  
 "malicious" 
 : 
  
 7 
  
 }, 
  
 "trid" 
 : 
  
 [ 
  
 { 
  
 "file_type" 
 : 
  
 "Win32 Executable MS Visual C++ (generic)" 
 , 
  
 "probability" 
 : 
  
 54.3 
  
 }, 
  
 { 
  
 "file_type" 
 : 
  
 "Win16 NE executable (generic)" 
 , 
  
 "probability" 
 : 
  
 12.2 
  
 }, 
  
 { 
  
 "file_type" 
 : 
  
 "Win32 Dynamic Link Library (generic)" 
 , 
  
 "probability" 
 : 
  
 11.4 
  
 }, 
  
 { 
  
 "file_type" 
 : 
  
 "Win32 Executable (generic)" 
 , 
  
 "probability" 
 : 
  
 7.8 
  
 }, 
  
 { 
  
 "file_type" 
 : 
  
 "OS/2 Executable (generic)" 
 , 
  
 "probability" 
 : 
  
 3.5 
  
 } 
  
 ], 
  
 "type_description" 
 : 
  
 "Win32 EXE" 
 , 
  
 "type_extension" 
 : 
  
 "exe" 
 , 
  
 "type_tag" 
 : 
  
 "peexe" 
 , 
  
 "unique_sources" 
 : 
  
 8 
 , 
  
 "vhash" 
 : 
  
 " HASH_VALUE 
" 
  
 }, 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "links" 
 : 
  
 { 
  
 "self" 
 : 
  
 "https://www.virustotal.com/api/v3/files/ FILE_ID 
" 
  
 }, 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "comments" 
 : 
  
 [ 
  
 { 
  
 "attributes" 
 : 
  
 { 
  
 "date" 
 : 
  
 1595402790 
 , 
  
 "html" 
 : 
  
 "#malware #Zeus<br /><br />Full genetic report from Intezer Analyze:<br />https://analyze.intezer.com/#/files/ FILE_ID 
<br /><br />#IntezerAnalyze" 
 , 
  
 "tags" 
 : 
  
 [ 
  
 "malware" 
 , 
  
 "zeus" 
 , 
  
 "intezeranalyze" 
  
 ], 
  
 "text" 
 : 
  
 "#malware #Zeus\n\nFull genetic report from Intezer Analyze:\nhttps://analyze.intezer.com/#/files/ FILE_ID 
\n\n#IntezerAnalyze" 
 , 
  
 "votes" 
 : 
  
 { 
  
 "abuse" 
 : 
  
 0 
 , 
  
 "negative" 
 : 
  
 0 
 , 
  
 "positive" 
 : 
  
 0 
  
 } 
  
 }, 
  
 "id" 
 : 
  
 "f- COMMENT_ID 
" 
 , 
  
 "links" 
 : 
  
 { 
  
 "self" 
 : 
  
 "https://www.virustotal.com/api/v3/comments/ COMMENT_ID 
" 
  
 }, 
  
 "type" 
 : 
  
 "comment" 
  
 } 
  
 ], 
  
 "widget_url" 
 : 
  
 "https://www.virustotal.com/ui/widget/html/ WIDGET_ID 
" 
 , 
  
 "related_mitre_tactics" 
 : 
  
 [ 
  
 { 
  
 "id" 
 : 
  
 "TA0002" 
 , 
  
 "name" 
 : 
  
 "Execution" 
  
 } 
  
 ], 
  
 "related_mitre_techniques" 
 : 
  
 [ 
  
 { 
  
 "id" 
 : 
  
 "T1129" 
 , 
  
 "name" 
 : 
  
 "Shared Modules" 
 , 
  
 "severity" 
 : 
  
 "INFO" 
  
 } 
  
 ], 
  
 "sandboxes_analysis" 
 : 
  
 { 
  
 "VirusTotal Jujubox" 
 : 
  
 { 
  
 "attributes" 
 : 
  
 { 
  
 "registry_keys_opened" 
 : 
  
 [ 
  
 "HKCU\\\\SOFTWARE\\\\Microsoft" 
 , 
  
 "SOFTWARE\\\\Microsoft\\\\Xuoc" 
  
 ], 
  
 "calls_highlighted" 
 : 
  
 [ 
  
 "GetTickCount" 
  
 ], 
  
 "tags" 
 : 
  
 [ 
  
 "DIRECT_CPU_CLOCK_ACCESS" 
 , 
  
 "RUNTIME_MODULES" 
  
 ], 
  
 "files_written" 
 : 
  
 [ 
  
 "C:\\\\Users\\\\ USER 
\\\\AppData\\\\Roaming\\\\example.exe" 
  
 ], 
  
 "mutexes_opened" 
 : 
  
 [ 
  
 "Local\\\\" 
  
 ], 
  
 "modules_loaded" 
 : 
  
 [ 
  
 "ADVAPI32.dll" 
  
 ], 
  
 "analysis_date" 
 : 
  
 1593005327 
 , 
  
 "sandbox_name" 
 : 
  
 "VirusTotal Jujubox" 
 , 
  
 "has_html_report" 
 : 
  
 true 
 , 
  
 "behash" 
 : 
  
 " HASH_VALUE 
" 
 , 
  
 "has_evtx" 
 : 
  
 false 
 , 
  
 "text_highlighted" 
 : 
  
 [ 
  
 "C:\\\\Windows\\\\system32\\\\cmd.exe" 
  
 ], 
  
 "last_modification_date" 
 : 
  
 1593005327 
 , 
  
 "has_memdump" 
 : 
  
 false 
 , 
  
 "mutexes_created" 
 : 
  
 [ 
  
 "Global\\\\" 
  
 ], 
  
 "has_pcap" 
 : 
  
 true 
 , 
  
 "files_opened" 
 : 
  
 [ 
  
 "C:\\\\Windows\\\\system32\\\\SXS.DLL" 
  
 ] 
  
 }, 
  
 "type" 
 : 
  
 "file_behaviour" 
 , 
  
 "id" 
 : 
  
 " FILE_ID 
_VirusTotal Jujubox" 
 , 
  
 "links" 
 : 
  
 { 
  
 "self" 
 : 
  
 "https://www.virustotal.com/api/v3/file_behaviours/ FILE_ID 
_VirusTotal Jujubox" 
  
 } 
  
 } 
  
 } 
  
 } 
  
 } 
  
 ], 
  
 "is_risky" 
 : 
  
 true 
 } 
 
Output messages

The Enrich Entitiesaction can return the following output messages:

Output message Message description

Successfully enriched the following entities using Google Threat Intelligence: ENTITY_ID

The action wasn't able to enrich the following entities using Google Threat Intelligence: ENTITY_ID

The action didn't enrich any of the provided entities.

The action succeeded.
Error executing action "Enrich Entities". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Enrich Entitiesaction:

Script result name Value
is_success True or False

Enrich IOCs

Use the Enrich IOCsaction to enrich the indicators of compromise (IoCs) using information from Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Enrich IOCsaction requires the following parameters:

Parameter
Description
IOC Type

Optional.

The type of the IOC to enrich.

The possible values are as follows:

  • Filehash
  • URL
  • Domain
  • IP Address

The default value is Filehash .

IOCs

Required.

A comma-separated list of IOCs to ingest data.

Action outputs

The Enrich IOCsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Available
Case wall table Available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available

The Enrich IOCsaction can provide the following link for every enriched entity:

Name: Report Link

Value: URL

Case wall table

The Enrich IOCsaction can provide the following table for every enriched entity:

Table name: IOC_ID

Table columns:

  • Name
  • Category
  • Method
  • Result
JSON result

The following example shows the JSON result output received when using the Enrich IOCsaction:

  { 
  
 "ioc" 
 : 
  
 { 
  
 "identifier" 
 : 
  
 "203.0.113.1" 
 , 
  
 "details" 
 : 
  
 { 
  
 "attributes" 
 : 
  
 { 
  
 "categories" 
 : 
  
 { 
  
 "Dr.Web" 
 : 
  
 "known infection source/not recommended site" 
 , 
  
 "Forcepoint ThreatSeeker" 
 : 
  
 "compromised websites" 
 , 
  
 "sophos" 
 : 
  
 "malware repository, spyware and malware" 
  
 }, 
  
 "first_submission_date" 
 : 
  
 1582300443 
 , 
  
 "html_meta" 
 : 
  
 {}, 
  
 "last_analysis_date" 
 : 
  
 1599853405 
 , 
  
 "last_analysis_results" 
 : 
  
 { 
  
 "EXAMPLELabs" 
 : 
  
 { 
  
 "category" 
 : 
  
 "harmless" 
 , 
  
 "engine_name" 
 : 
  
 "EXAMPLELabs" 
 , 
  
 "method" 
 : 
  
 "blacklist" 
 , 
  
 "result" 
 : 
  
 "clean" 
  
 }, 
  
 "Example" 
 : 
  
 { 
  
 "category" 
 : 
  
 "harmless" 
 , 
  
 "engine_name" 
 : 
  
 "Example" 
 , 
  
 "method" 
 : 
  
 "blacklist" 
 , 
  
 "result" 
 : 
  
 "clean" 
  
 } 
  
 }, 
  
 "last_analysis_stats" 
 : 
  
 { 
  
 "harmless" 
 : 
  
 64 
 , 
  
 "malicious" 
 : 
  
 6 
 , 
  
 "suspicious" 
 : 
  
 1 
 , 
  
 "timeout" 
 : 
  
 0 
 , 
  
 "undetected" 
 : 
  
 8 
  
 }, 
  
 "last_final_url" 
 : 
  
 "http://203.0.113.1/input/?mark=20200207-example.com/31mawe&tpl=example&engkey=bar+chart+click+event" 
 , 
  
 "last_http_response_code" 
 : 
  
 404 
 , 
  
 "last_http_response_content_length" 
 : 
  
 204 
 , 
  
 "last_http_response_content_sha256" 
 : 
  
 "58df637d178e35690516bda9e41e245db836170f046041fdebeedd20eca61d9d" 
 , 
  
 "last_http_response_headers" 
 : 
  
 { 
  
 "connection" 
 : 
  
 "keep-alive" 
 , 
  
 "content-length" 
 : 
  
 "204" 
 , 
  
 "content-type" 
 : 
  
 "text/html; charset=iso-8859-1" 
 , 
  
 "date" 
 : 
  
 "Fri, 11 Sep 2020 19:51:50 GMT" 
 , 
  
 "keep-alive" 
 : 
  
 "timeout=60" 
 , 
  
 "server" 
 : 
  
 "nginx" 
  
 }, 
  
 "last_modification_date" 
 : 
  
 1599853921 
 , 
  
 "last_submission_date" 
 : 
  
 1599853405 
 , 
  
 "reputation" 
 : 
  
 0 
 , 
  
 "tags" 
 : 
  
 [ 
  
 "ip" 
  
 ], 
  
 "targeted_brand" 
 : 
  
 {}, 
  
 "threat_names" 
 : 
  
 [ 
  
 "Mal/HTMLGen-A" 
  
 ], 
  
 "times_submitted" 
 : 
  
 3 
 , 
  
 "title" 
 : 
  
 "404 Not Found" 
 , 
  
 "total_votes" 
 : 
  
 { 
  
 "harmless" 
 : 
  
 0 
 , 
  
 "malicious" 
 : 
  
 0 
  
 }, 
  
 "trackers" 
 : 
  
 {}, 
  
 "url" 
 : 
  
 "http://203.0.113.1/input/?mark=20200207-example.com/31mawe&tpl=example&engkey=bar+chart+click+event" 
  
 }, 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "links" 
 : 
  
 { 
  
 "self" 
 : 
  
 "https://www.virustotal.com/api/v3/urls/ ID 
" 
  
 }, 
  
 "type" 
 : 
  
 "url" 
 , 
  
 "report_link" 
 : 
  
 "{generated report link}" 
 , 
  
 "widget_url" 
 : 
  
 "https: //www.virustotal.com/ui/widget/html/ WIDGET_ID 
" 
 "widget_html" 
  
 } 
  
 } 
 } 
 
Output messages

The Enrich IOCsaction can return the following output messages:

Output message Message description

Successfully enriched the following IOCs using Google Threat Intelligence: IOC_LIST

No information found for the following IOCs using Google Threat Intelligence: IOC_LIST

No information about IOCs was found.

The action succeeded.
Error executing action "Enrich IOC". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Enrich IOCsaction:

Script result name Value
is_success True or False

Use the Execute IOC Searchaction to run the IOC search in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Execute IOC Searchaction requires the following parameters:

Parameter Description
Search Query

Required.

A search query to run, such as crowdsourced_yara_rule:*apt* and p:3+ and fs:2d+ .

Max Results To Return

Optional.

The maximum number of results to return for every action run.

The maximum value is 200 .

The default value is 50 .

Action outputs

The Execute IOC Searchaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Execute IOC Searchaction:

  { 
  
 "attributes" 
 :{ 
  
 "type_description" 
 : 
 "Android" 
 , 
  
 "tlsh" 
 : 
 "T156B6128BF7885D2BC0B78136899A1136B76A8D254B43A3473548772C3EB32D44F6DBD8" 
 , 
  
 "vhash" 
 : 
 "8d145b883d0a7f814ba5b130454fbf36" 
 , 
  
 "exiftool" 
 :{ 
  
 "ZipRequiredVersion" 
 : 
 "20" 
 , 
  
 "MIMEType" 
 : 
 "application/zip" 
 , 
  
 "ZipCRC" 
 : 
 "0xf27716ce" 
 , 
  
 "FileType" 
 : 
 "ZIP" 
 , 
  
 "ZipCompression" 
 : 
 "Deflated" 
 , 
  
 "ZipUncompressedSize" 
 : 
 "46952" 
 , 
  
 "ZipCompressedSize" 
 : 
 "8913" 
 , 
  
 "FileTypeExtension" 
 : 
 "zip" 
 , 
  
 "ZipFileName" 
 : 
 "Example.xml" 
 , 
  
 "ZipBitFlag" 
 : 
 "0x0800" 
 , 
  
 "ZipModifyDate" 
 : 
 "2023:06:11 17:54:18" 
  
 }, 
  
 "type_tags" 
 :[ 
  
 "executable" 
 , 
  
 "mobile" 
 , 
  
 "android" 
 , 
  
 "apk" 
  
 ], 
  
 "crowdsourced_yara_results" 
 :[ 
 " RESULTS_OMITTED 
" 
 ] 
  
 "magic" 
 : 
 "Zip archive data, at least v1.0 to extract, compression method=store" 
 , 
  
 "permhash" 
 : 
 "a3e0005ad57d3ff03e09e0d055ad10bcf28a58a04a8c2aeccdad2b9e9bc52434" 
 , 
  
 "meaningful_name" 
 : 
 "Example" 
 , 
  
 "reputation" 
 : 
 0 
  
 }, 
  
 "type" 
 : 
 "file" 
 , 
  
 "id" 
 : 
 " FILE_ID 
" 
 , 
  
 "links" 
 :{ 
  
 "self" 
 : 
 "https://www.virustotal.com/api/v3/files/ FILE_ID 
" 
  
 } 
 } 
 
Output messages

The Execute IOC Searchaction can return the following output messages:

Output message Message description

Successfully found results for the provided query in Google Threat Intelligence.

No results were found for the provided query in Google Threat Intelligence.

The action succeeded.
Error executing action "Execute IOC Search". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Execute IOC Searchaction:

Script result name Value
is_success True or False

Get ASM Entity Details

Use the Get ASM Entity Detailsaction to obtain information about an ASM entity in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Get ASM Entity Detailsaction requires the following parameters:

Parameter Description
Entity ID

Required.

A comma-separated list of entity IDs to obtain details.

Action outputs

The Get ASM Entity Detailsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Get ASM Entity Detailsaction:

  { 
  
 "uuid" 
 : 
  
 " UUID 
" 
 , 
  
 "dynamic_id" 
 : 
  
 "Intrigue::Entity::Uri#http://192.0.2.73:80" 
 , 
  
 "collection_name" 
 : 
  
 "example_oum28bu" 
 , 
  
 "alias_group" 
 : 
  
 8515 
 , 
  
 "aliases" 
 : 
  
 [ 
  
 "http://192.0.2.73:80" 
  
 ], 
  
 "allow_list" 
 : 
  
 false 
 , 
  
 "ancestors" 
 : 
  
 [ 
  
 { 
  
 "type" 
 : 
  
 "Intrigue::Entity::NetBlock" 
 , 
  
 "name" 
 : 
  
 "192.0.2.0/24" 
  
 } 
  
 ], 
  
 "category" 
 : 
  
 null 
 , 
  
 "collection_naics" 
 : 
  
 null 
 , 
  
 "confidence" 
 : 
  
 null 
 , 
  
 "deleted" 
 : 
  
 false 
 , 
  
 "deny_list" 
 : 
  
 false 
 , 
  
 "details" 
 : 
  
< ! 
  
 CONTENT 
  
 OMITTED 
  
  
>  
 "http" 
 : 
  
 { 
  
 "code" 
 : 
  
 404 
 , 
  
 "title" 
 : 
  
 "404 Not Found" 
 , 
  
 "content" 
 : 
  
 { 
  
 "favicon_hash" 
 : 
  
 null 
 , 
  
 "hash" 
 : 
  
 null 
 , 
  
 "forms" 
 : 
  
 false 
  
 }, 
  
 "auth" 
 : 
  
 { 
  
 "any" 
 : 
  
 false 
 , 
  
 "basic" 
 : 
  
 false 
 , 
  
 "ntlm" 
 : 
  
 false 
 , 
  
 "forms" 
 : 
  
 false 
 , 
  
 "2fa" 
 : 
  
 false 
  
 } 
  
 }, 
  
 "ports" 
 : 
  
 { 
  
 "tcp" 
 : 
  
 [ 
  
 80 
  
 ], 
  
 "udp" 
 : 
  
 [], 
  
 "count" 
 : 
  
 1 
  
 }, 
  
 "network" 
 : 
  
 { 
  
 "name" 
 : 
  
 "Example, Inc." 
 , 
  
 "asn" 
 : 
  
 16509 
 , 
  
 "route" 
 : 
  
 null 
 , 
  
 "type" 
 : 
  
 null 
  
 }, 
  
 "technology" 
 : 
  
 { 
  
 "cloud" 
 : 
  
 true 
 , 
  
 "cloud_providers" 
 : 
  
 [ 
  
 "Example Services" 
  
 ], 
  
 "cpes" 
 : 
  
 [], 
  
 "technologies" 
 : 
  
 [], 
  
 "technology_labels" 
 : 
  
 [] 
  
 }, 
  
 "vulns" 
 : 
  
 { 
  
 "current_count" 
 : 
  
 0 
 , 
  
 "vulns" 
 : 
  
 [] 
  
 } 
  
 }, 
  
 { 
  
 "tags" 
 : 
  
 [], 
  
 "id" 
 : 
  
 8620 
 , 
  
 "scoped_at" 
 : 
  
 "2022-09-30 06:51:57 +0000" 
 , 
  
 "detail_string" 
 : 
  
 "Fingerprint: Nginx |  Title: 404 Not Found" 
 , 
  
 "enrichment_tasks" 
 : 
  
 [ 
  
 "enrich/uri" 
 , 
  
 "sslcan" 
  
 ], 
  
 "generated_at" 
 : 
  
 "2022-09-30T21:21:18Z" 
 } 
 
Output messages

The Get ASM Entity Detailsaction can return the following output messages:

Output message Message description

Successfully returned details for the following entities using information from Google Threat Intelligence: ENTITY_ID

The action wasn't able to return details for the following entities using information from Google Threat Intelligence: ENTITY_ID

The action succeeded.
Error executing action "Get ASM Entity Details". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get ASM Entity Detailsaction:

Script result name Value
is_success True or False

Get Graph Details

Use the Get Graph Detailsaction to obtain detailed information about graphs in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Get Graph Detailsaction requires the following parameters:

Parameter Description
Graph ID

Required.

A comma-separated list of graph IDs to retrieve details.

Max Links To Return

Required.

The maximum number of links to return for each graph.

The default value is 50 .

Action outputs

The Get Graph Detailsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
Case wall table

The Get Graph Detailsaction can provide the following table for every enriched entity:

Table name: Graph GRAPH_ID Links

Table columns:

  • Source
  • Target
  • Connection Type
JSON result

The following example shows the JSON result output received when using the Get Graph Detailsaction:

  { 
  
 "data" 
 : 
  
 { 
  
 "attributes" 
 : 
  
 { 
  
 "comments_count" 
 : 
  
 0 
 , 
  
 "creation_date" 
 : 
  
 1603219837 
 , 
  
 "graph_data" 
 : 
  
 { 
  
 "description" 
 : 
  
 "Example LLC" 
 , 
  
 "version" 
 : 
  
 "api-5.0.0" 
  
 }, 
  
 "last_modified_date" 
 : 
  
 1603219837 
 , 
  
 "links" 
 : 
  
 [ 
  
 { 
  
 "connection_type" 
 : 
  
 "last_serving_ip_address" 
 , 
  
 "source" 
 : 
  
 "ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
 , 
  
 "target" 
 : 
  
 "relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "last_serving_ip_address" 
 , 
  
 "source" 
 : 
  
 "relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
 , 
  
 "target" 
 : 
  
 "203.0.113.3" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "network_location" 
 , 
  
 "source" 
 : 
  
 "ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
 , 
  
 "target" 
 : 
  
 "relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "network_location" 
 , 
  
 "source" 
 : 
  
 "relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
 , 
  
 "target" 
 : 
  
 "203.0.113.3" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "203.0.113.3" 
 , 
  
 "target" 
 : 
  
 "relationships_communicating_files_20301133" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "4935cc8a4ff76d595e1bfab9fd2e6aa0f7c2fea941693f1ab4586eaba1528f47" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "c975794ff65c02b63fae1a94006a75294aac13277ca464e3ea7e40de5eda2b14" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "c7752154a2e894a4dec84833bee656357f4b84a9c7f601f586f79de667d8fe5c" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "692bb2ed1da43b0408c104b4ca4b4e97e15f3224e37dbea60214bcd991a2cfd3" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "74273ef55d8b7d23f7b058c7e47f3cbaf60c823a3e41ffb10e494917bad77381" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "f4f2f17c4df1b558cb80c8eab3edf5198970e9d87bd03943d4c2effafb696187" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "5edc8496869697aa229540bd6106b6679f6cfcbc6ee4837887183f470b49acb5" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "1582da57cb082d3f6835158133aafb5f3b8dcc880a813be135a0ff8099cf0ee8" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "be4ccb1ca71a987f481c22a1a43de491353945d815c89cbcc06233d993ac73cf" 
  
 }, 
  
 { 
  
 "connection_type" 
 : 
  
 "communicating_files" 
 , 
  
 "source" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "target" 
 : 
  
 "60bb6467ee465f23a15f17cd73f7ecb9db9894c5a3186081a1c70fdc6e7607d6" 
  
 } 
  
 ], 
  
 "nodes" 
 : 
  
 [ 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 false 
  
 }, 
  
 "entity_id" 
 : 
  
 "ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
 , 
  
 "index" 
 : 
  
 0 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "url" 
 , 
  
 "x" 
 : 
  
 51.22276722115952 
 , 
  
 "y" 
 : 
  
 65.7811310194184 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 {}, 
  
 "entity_id" 
 : 
  
 "relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
 , 
  
 "index" 
 : 
  
 1 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "relationship" 
 , 
  
 "x" 
 : 
  
 25.415664700492094 
 , 
  
 "y" 
 : 
  
 37.66636498768037 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "country" 
 : 
  
 "US" 
  
 }, 
  
 "entity_id" 
 : 
  
 "203.0.113.3" 
 , 
  
 "fx" 
 : 
  
 -19.03611541222395 
 , 
  
 "fy" 
 : 
  
 24.958500220062717 
 , 
  
 "index" 
 : 
  
 2 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "ip_address" 
 , 
  
 "x" 
 : 
  
 -19.03611541222395 
 , 
  
 "y" 
 : 
  
 24.958500220062717 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 {}, 
  
 "entity_id" 
 : 
  
 "relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671" 
 , 
  
 "index" 
 : 
  
 3 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "relationship" 
 , 
  
 "x" 
 : 
  
 14.37403861978968 
 , 
  
 "y" 
 : 
  
 56.85562691824892 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 {}, 
  
 "entity_id" 
 : 
  
 "relationships_communicating_files_20301133" 
 , 
  
 "index" 
 : 
  
 4 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "relationship" 
 , 
  
 "x" 
 : 
  
 -51.78097726144755 
 , 
  
 "y" 
 : 
  
 10.087893225996158 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "peexe" 
  
 }, 
  
 "entity_id" 
 : 
  
 "4935cc8a4ff76d595e1bfab9fd2e6aa0f7c2fea941693f1ab4586eaba1528f47" 
 , 
  
 "index" 
 : 
  
 5 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -79.11606194776019 
 , 
  
 "y" 
 : 
  
 -18.475026322309112 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "peexe" 
  
 }, 
  
 "entity_id" 
 : 
  
 "c975794ff65c02b63fae1a94006a75294aac13277ca464e3ea7e40de5eda2b14" 
 , 
  
 "index" 
 : 
  
 6 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -64.80938048199627 
 , 
  
 "y" 
 : 
  
 46.75892061191275 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "android" 
  
 }, 
  
 "entity_id" 
 : 
  
 "c7752154a2e894a4dec84833bee656357f4b84a9c7f601f586f79de667d8fe5c" 
 , 
  
 "index" 
 : 
  
 7 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -43.54064004476819 
 , 
  
 "y" 
 : 
  
 -28.547923020662786 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "android" 
  
 }, 
  
 "entity_id" 
 : 
  
 "692bb2ed1da43b0408c104b4ca4b4e97e15f3224e37dbea60214bcd991a2cfd3" 
 , 
  
 "index" 
 : 
  
 8 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -15.529860440278318 
 , 
  
 "y" 
 : 
  
 -2.068209789825876 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "android" 
  
 }, 
  
 "entity_id" 
 : 
  
 "74273ef55d8b7d23f7b058c7e47f3cbaf60c823a3e41ffb10e494917bad77381" 
 , 
  
 "index" 
 : 
  
 9 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -42.55971948293377 
 , 
  
 "y" 
 : 
  
 46.937155845680415 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "html" 
  
 }, 
  
 "entity_id" 
 : 
  
 "f4f2f17c4df1b558cb80c8eab3edf5198970e9d87bd03943d4c2effafb696187" 
 , 
  
 "index" 
 : 
  
 10 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -62.447976875107706 
 , 
  
 "y" 
 : 
  
 -28.172418384729067 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "android" 
  
 }, 
  
 "entity_id" 
 : 
  
 "5edc8496869697aa229540bd6106b6679f6cfcbc6ee4837887183f470b49acb5" 
 , 
  
 "index" 
 : 
  
 11 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -89.0326649183805 
 , 
  
 "y" 
 : 
  
 -2.2638551448322484 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "android" 
  
 }, 
  
 "entity_id" 
 : 
  
 "1582da57cb082d3f6835158133aafb5f3b8dcc880a813be135a0ff8099cf0ee8" 
 , 
  
 "index" 
 : 
  
 12 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -26.35260716195174 
 , 
  
 "y" 
 : 
  
 -20.25669077264115 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "android" 
  
 }, 
  
 "entity_id" 
 : 
  
 "be4ccb1ca71a987f481c22a1a43de491353945d815c89cbcc06233d993ac73cf" 
 , 
  
 "index" 
 : 
  
 13 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -82.1415994911387 
 , 
  
 "y" 
 : 
  
 34.89636762607467 
  
 }, 
  
 { 
  
 "entity_attributes" 
 : 
  
 { 
  
 "has_detections" 
 : 
  
 true 
 , 
  
 "type_tag" 
 : 
  
 "android" 
  
 }, 
  
 "entity_id" 
 : 
  
 " ENTITY_ID 
" 
 , 
  
 "index" 
 : 
  
 14 
 , 
  
 "text" 
 : 
  
 "" 
 , 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "x" 
 : 
  
 -90.87738694680043 
 , 
  
 "y" 
 : 
  
 16.374462198116138 
  
 } 
  
 ], 
  
 "private" 
 : 
  
 false 
 , 
  
 "views_count" 
 : 
  
 30 
  
 }, 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "links" 
 : 
  
 { 
  
 "self" 
 : 
  
 "https://www.virustotal.com/api/v3/graphs/ ID 
" 
  
 }, 
  
 "type" 
 : 
  
 "graph" 
  
 } 
 } 
 
Output messages

The Get Graph Detailsaction can return the following output messages:

Output message Message description

Successfully returned details about the following graphs in Google Threat Intelligence: GRAPH_IDS

Action wasn't able to return details about the following graphs in Google Threat Intelligence: GRAPH_IDS

No information about the provided graphs was found.

The action succeeded.
Error executing action "Get Graph Details". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Graph Detailsaction:

Script result name Value
is_success True or False

Use the Get Related IOCsaction to get information about IOCs related to entities using information from Google Threat Intelligence.

This action only supports the MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • IP address
  • URL
  • Hostname
  • Domain
  • Hash
  • Threat Actor

Action inputs

The Get Related IOCsaction requires the following parameters:

Parameter Description
IOC Types

Required.

A comma-separated list of IOCs to extract.

The possible values are as follows: IP , Hash , URL , Domain .

Max IOCs To Return

Required.

The maximum number of IOCs to return for selected IOC types for every entity.

The default value is 40 .

Action outputs

The Get Related IOCsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result. Available
JSON result

The following example shows the JSON result output received when using the Get Related IOCsaction:

  { 
  
 "Entity" 
 : 
  
 " ENTITY 
" 
 , 
  
 "EntityResult" 
 : 
  
 { 
  
 "hash" 
 : 
  
 [ 
  
 " HASH 
" 
  
 ], 
  
 "url" 
 : 
  
 [ 
  
 " URL 
" 
  
 ], 
  
 "domain" 
 : 
  
 [ 
  
 " DOMAIN 
" 
  
 ], 
  
 "ip" 
 : 
  
 [ 
  
 " IP_ADDRESS 
" 
  
 ] 
  
 } 
 } 
 
Output messages

The Get Related IOCsaction can return the following output messages:

Output message Message description

Successfully returned related IOCs for the following entities in Google Threat Intelligence: ENTITY

No related IOCs were found for the following entities in Google Threat Intelligence: ENTITY .

No related IOCs were found for the provided entities.

The action succeeded.
Error executing action "Get Related IOCs". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Related IOCsaction:

Script result name Value
is_success True or False

Ping

Use the Pingaction to test the connectivity to Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

None.

Action outputs

The Pingaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result. Available
Output messages

The Pingaction can return the following output messages:

Output message Message description

Successfully connected to the Google Threat Intelligence server with the provided connection parameters!

The action succeeded.
Failed to connect to the Google Threat Intelligence server! Error is ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Pingaction:

Script result name Value
is_success True or False

Search ASM Entities

Use the Search ASM Entitiesaction to search for ASM entities in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Search ASM Entitiesaction requires the following parameters:

Parameter Description
Project Name

Optional.

The name of the ASM project.

If you don't set a value, the action uses the value that you configured for the ASM Project Name integration parameter.

Entity Name

Optional.

A comma-separated list of entity names to find entities.

The action treats entity names that contain / forward slashes as invalid values.

Minimum Vulnerabilities Count

Optional.

The minimum number of vulnerabilities required for the action to return the entity.

Minimum Issues Count

Optional.

The minimum number of issues required for the action to return the entity.

Tags

Optional.

A comma-separated list of tag names to use when searching for entities.

Max Entities To Return

Optional.

The number of entities to return.

The maximum value is 200 . The default value is 50 .

Critical or High Issue

Optional.

If selected, the action only returns issues with High and Critical severity.

Not selected by default.

Action outputs

The Search ASM Entitiesaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Search ASM Entitiesaction:

  { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "dynamic_id" 
 : 
  
 "Intrigue::Entity::IpAddress#192.0.2.92" 
 , 
  
 "alias_group" 
 : 
  
 "1935953" 
 , 
  
 "name" 
 : 
  
 "192.0.2.92" 
 , 
  
 "type" 
 : 
  
 "Intrigue::Entity::IpAddress" 
 , 
  
 "first_seen" 
 : 
  
 "2022-02-02T01:44:46Z" 
 , 
  
 "last_seen" 
 : 
  
 "2022-02-02T01:44:46Z" 
 , 
  
 "collection" 
 : 
  
 "cpndemorange_oum28bu" 
 , 
  
 "collection_type" 
 : 
  
 "Intrigue::Collections::UserCollection" 
 , 
  
 "collection_naics" 
 : 
  
 [], 
  
 "collection_uuid" 
 : 
  
 " COLLECTION_UUID 
" 
 , 
  
 "organization_uuid" 
 : 
  
 " ORGANIZATION_UUID 
" 
 , 
  
 "tags" 
 : 
  
 [], 
  
 "issues" 
 : 
  
 [], 
  
 "exfil_lookup_identifier" 
 : 
  
 null 
 , 
  
 "summary" 
 : 
  
 { 
  
 "scoped" 
 : 
  
 true 
 , 
  
 "issues" 
 : 
  
 { 
  
 "current_by_severity" 
 : 
  
 {}, 
  
 "current_with_cve" 
 : 
  
 0 
 , 
  
 "all_time_by_severity" 
 : 
  
 {}, 
  
 "current_count" 
 : 
  
 0 
 , 
  
 "all_time_count" 
 : 
  
 0 
 , 
  
 "critical_or_high" 
 : 
  
 false 
  
 }, 
  
 "task_results" 
 : 
  
 [ 
  
 "search_shodan" 
  
 ], 
  
 "geolocation" 
 : 
  
 { 
  
 "city" 
 : 
  
 "San Jose" 
 , 
  
 "country_code" 
 : 
  
 "US" 
 , 
  
 "country_name" 
 : 
  
 null 
 , 
  
 "latitude" 
 : 
  
 "-121.8896" 
 , 
  
 "asn" 
 : 
  
 null 
  
 }, 
  
 "ports" 
 : 
  
 { 
  
 "count" 
 : 
  
 0 
 , 
  
 "tcp" 
 : 
  
 null 
 , 
  
 "udp" 
 : 
  
 null 
  
 }, 
  
 "resolutions" 
 : 
  
 [ 
  
 "ec2-192-0-2-92.us-west-1.compute.example.com" 
  
 ], 
  
 "network" 
 : 
  
 { 
  
 "name" 
 : 
  
 "EXAMPLE-02" 
 , 
  
 "asn" 
 : 
  
 "16509.0" 
 , 
  
 "route" 
 : 
  
 "2001:db8::/32" 
 , 
  
 "type" 
 : 
  
 null 
  
 }, 
  
 "technology" 
 : 
  
 { 
  
 "cloud" 
 : 
  
 true 
 , 
  
 "cloud_providers" 
 : 
  
 [ 
  
 "Cloud Provider Name" 
  
 ] 
  
 } 
  
 } 
 } 
 
Output messages

The Search ASM Entitiesaction can return the following output messages:

Output message Message description

Successfully returned entities based on the provided criteria in Google Threat Intelligence.

No entities were found based on the provided criteria in Google Threat Intelligence.

The action succeeded.
Error executing action "Search ASM Entities". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Search ASM Entitiesaction:

Script result name Value
is_success True or False

Search ASM Issues

Use the Search ASM Issuesaction to search for ASM issues in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Search ASM Issuesaction requires the following parameters:

Parameter
Description
Project Name

Optional.

The name of the ASM project.

If you don't set a value, the action uses the value that you configured for the ASM Project Name integration parameter.

Issue ID

Optional.

A comma-separated list of issue IDs to return the details.

Entity ID

Optional.

A comma-separated list of entity IDs to find related issues.

Entity Name

Optional.

A comma-separated list of entity names to find related issues.

The action treats entity names that contain / forward slashes as invalid values.

Time Parameter

Optional.

A filter option to set the issue time.

The possible values are First Seen and Last Seen .

The default value is First Seen .

Time Frame

Optional.

A period to filter issues. If you select Custom , configure the Start Time parameter.

The possible values are as follows:

  • Last Hour
  • Last 6 Hours
  • Last 24 Hours
  • Last Week
  • Last Month
  • Custom

The default value is Last Hour .

Start Time

Optional.

The start time for the results.

If you selected Custom for the Time Frame parameter, this parameter is required.

Configure the value in the ISO 8601 format.

End Time

Optional.

The end time for the results.

If you selected Custom for the Time Frame parameter and didn't set the end time, this parameter uses the current time as the end time.

Configure the value in the ISO 8601 format.

Lowest Severity To Return

Optional.

The lowest severity of the issues to return.

The possible values are as follows:

  • Select One
  • Critical
  • High
  • Medium
  • Low
  • Informational

The default value is Select One .

If you select Select One , this filter doesn't apply to the search.

Status

Optional.

The status filter for the search.

The possible values are Open , Closed , and Select One .

The default value is Select One .

If you select Select One , this filter doesn't apply to the search.

Tags

Optional.

A comma-separated list of tag names to use when searching for issues.

Max Issues To Return

Required.

The number of issues to return.

The maximum value is 200 . The default value is 50 .

Action outputs

The Search ASM Issuesaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Available
JSON result Not available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Search ASM Issuesaction:

  { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "uuid" 
 : 
  
 " UUID 
" 
 , 
  
 "dynamic_id" 
 : 
  
 20073997 
 , 
  
 "name" 
 : 
  
 "exposed_ftp_service" 
 , 
  
 "upstream" 
 : 
  
 "intrigue" 
 , 
  
 "last_seen" 
 : 
  
 "2022-02-02T01:44:46.000Z" 
 , 
  
 "first_seen" 
 : 
  
 "2022-02-02T01:44:46.000Z" 
 , 
  
 "entity_uid" 
 : 
  
 "3443a638f951bdc23d3a089bff738cd961a387958c7f5e4975a26f12e544241f" 
 , 
  
 "entity_type" 
 : 
  
 "Intrigue::Entity::NetworkService" 
 , 
  
 "entity_name" 
 : 
  
 "192.0.2.204:24/tcp" 
 , 
  
 "alias_group" 
 : 
  
 "1937534" 
 , 
  
 "collection" 
 : 
  
 "example_oum28bu" 
 , 
  
 "collection_uuid" 
 : 
  
 "511311a6-6ff4-4933-8f5b-f1f7df2f6a3e" 
 , 
  
 "collection_type" 
 : 
  
 "user_collection" 
 , 
  
 "organization_uuid" 
 : 
  
 "21d2d125-d398-4bcb-bae1-11aee14adcaf" 
 , 
  
 "summary" 
 : 
  
 { 
  
 "pretty_name" 
 : 
  
 "Exposed FTP Service" 
 , 
  
 "severity" 
 : 
  
 3 
 , 
  
 "scoped" 
 : 
  
 true 
 , 
  
 "confidence" 
 : 
  
 "confirmed" 
 , 
  
 "status" 
 : 
  
 "open_new" 
 , 
  
 "category" 
 : 
  
 "misconfiguration" 
 , 
  
 "identifiers" 
 : 
  
 null 
 , 
  
 "status_new" 
 : 
  
 "open" 
 , 
  
 "status_new_detailed" 
 : 
  
 "new" 
 , 
  
 "ticket_list" 
 : 
  
 null 
  
 }, 
  
 "tags" 
 : 
  
 [] 
 } 
 
Output messages

The Search ASM Issuesaction can return the following output messages:

Output message Message description

Successfully returned issues based on the provided criteria in Google Threat Intelligence.

No issues were found based on the provided criteria in Google Threat Intelligence.

The action succeeded.
Error executing action "Search ASM Issues". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Search ASM Issuesaction:

Script result name Value
is_success True or False

Search Entity Graphs

Use the Search Entity Graphsaction to search graphs that are based on Google SecOps entities in Google Threat Intelligence.

This action only supports the MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • File Hash
  • Hostname
  • IP Address
  • Threat Actor
  • URL
  • User

Action inputs

The Search Entity Graphsaction requires the following parameters:

Parameter
Description
Sort Field

Optional.

The field value to sort the results.

The possible values are as follows:

  • Owner
  • Creation Date
  • Last Modified Date
  • Views Count
  • Comments Count

The default value is Owner .

Max Graphs To Return

Optional.

The maximum number of graphs to return for every action run.

The default value is 10 .

Action outputs

The Search Entity Graphsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Search Entity Graphsaction:

  { 
  
 "data" 
 : 
  
 [ 
  
 { 
  
 "attributes" 
 : 
  
 { 
  
 "graph_data" 
 : 
  
 { 
  
 "description" 
 : 
  
 "EXAMPLE" 
 , 
  
 "version" 
 : 
  
 "5.0.0" 
  
 } 
  
 }, 
  
 "id" 
 : 
  
 " ID 
" 
  
 } 
  
 ] 
 } 
 
Output messages

The Search Entity Graphsaction can return the following output messages:

Output message Message description

Successfully returned graphs based on the provided entities in Google Threat Intelligence.

Action wasn't able to successfully return graph based on the provided entities in Google Threat Intelligence. Reason: ERROR_REASON .

No graphs were found for the provided entities.

The action succeeded.
Error executing action "Search Entity Graphs". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Search Graphs

Use the Search Graphsaction to search graphs based on custom filters in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Search Graphsaction requires the following parameters:

Parameter
Description
Query

Required.

The query filter for the graph.

For example, to search for graphs in the selected period, format the query as follows: creation_date:2018-11-1+creation_date:2018-11-12

For more information about queries, see How to create queries , Graph-related modifiers , and Node-related modifiers .

Sort Field

Optional.

The field value to sort the VirusTotal graphs.

The possible values are as follows:

  • Comments Count
  • Creation Date
  • Last Modified Date
  • Owner
  • Views Count

The default value is Owner .

Max Graphs To Return

Optional.

The maximum number of graphs to return for every action run.

The default value is 10 .

How to create queries

To refine search results from graphs, create queries that contain graph-related modifiers . To improve the search, you can combine modifiers with AND , OR , and NOT operators.

Date and numeric fields support the + plus and - minus suffixes. A plus suffix matches values greater than the provided value. A minus suffix matches values less than the provided value. Without a suffix, the query returns exact matches.

To define ranges, you can use the same modifier multiple times in a query. For example, to search graphs that are created between 2018-11-15 and 2018-11-20, use the following query:

 creation_date:2018-11-15+ creation_date:2018-11-20- 

For dates or months that begin with 0 , remove the 0 character in the query. For example, format the date of 2018-11-01 as 2018-11-1 .

The following table lists graph-related modifiers which you can use to construct the search query:

Modifier name Description Example
id
Filters by graph identifier. id:g675a2fd4c8834e288af
name
Filters by graph name. name:Example-name
owner
Filters by graphs owned by the user. owner:example_user
group
Filters by graphs owned by a group. group:example
visible_to_user
Filters by graphs visible to the user. visible_to_user:example_user
visible_to_group
Filters by graphs visible to the group. visible_to_group:example
private
Filters by private graphs. private:true , private:false
creation_date
Filters by the graph creation date. creation_date:2018-11-15
last_modified_date
Filters by the latest graph modification date. last_modified_date:2018-11-20
total_nodes
Filters by graphs that contain a specific number of nodes. total_nodes:100
comments_count
Filters by the number of comments in the graph. comments_count:10+
views_count
Filters by the number of graph views. views_count:1000+

The following table lists graph-related modifiers which you can use to construct the search query:

Modifier name Description Example
label
Filters by graphs that contain nodes with a specific label. label:Kill switch
file
Filters by graphs that contain the specific file. file:131f95c51cc819465fa17
domain
Filters by graphs that contain the specific domain. domain:example.com
ip_address
Filters by graphs that contain the specific IP address. ip_address:203.0.113.1
url
Filters by graphs that contain the specific URL. url:https://example.com/example/
actor
Filters by graphs that contain the specific actor. actor:example actor
victim
Filters by graphs that contain the specific victim. victim:example_user
email
Filters by graphs that contain the specific email address. email:user@example.com
department
Filters by graphs that contain the specific department. department:engineers

Action outputs

The Search Graphsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Search Graphsaction:

  { 
  
 "data" 
 : 
  
 [ 
  
 { 
  
 "attributes" 
 : 
  
 { 
  
 "graph_data" 
 : 
  
 { 
  
 "description" 
 : 
  
 "EXAMPLE" 
 , 
  
 "version" 
 : 
  
 "5.0.0" 
  
 } 
  
 }, 
  
 "id" 
 : 
  
 " ID 
" 
  
 } 
  
 ] 
 } 
 
Output messages

The Search Graphsaction can return the following output messages:

Output message Message description

Successfully returned graphs for the provided query in Google Threat Intelligence.

No graphs were found for the provided query.

The action succeeded.
Error executing action "Search Graphs". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Search Graphsaction:

Script result name Value
is_success True or False

Submit File

Use the Submit Fileaction to submit a file and return results from Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

This action is asynchronous. Adjust the script timeout value in the Google SecOps integrated development environment (IDE) for the action as needed.

Action inputs

The Submit Fileaction requires the following parameters:

Parameter Description
External URLs

Optional.

A comma-separated list of public URLs for the files to submit. If both "External URL" and "File Paths" are provided, the action will collect files from both inputs.

File Paths

Optional.

A comma-separated list of absolute file paths. If you configure the **Linux Server Address** parameter, the action attempts to retrieve the file from a remote server. If both "External URL" and "File Paths" are provided, the action will collect files from both inputs.

ZIP Password

Optional.

A password for the zipped folder that contains the files to submit.

Private Submission

Optional.

If selected, the action submits the file in a private mode.

To submit files privately, the VirusTotal Premium API is required.

Check Hash

Optional. Default: Disabled.

If enabled, action will first calculate the hashes for the files and search, if there is any available information for it. If available, it will return the information without the submission flow.

Retrieve Comments

Optional.

If selected, the action retrieves comments about the submitted file.

Fetch MITRE Details

Optional.

If selected, the action returns the information about the related MITRE techniques and tactics.

Not selected by default.

Lowest MITRE Technique Severity

Optional.

The lowest MITRE technique severity to return.

The action treats the Unknown severity as Info .

This parameter only supports the Hash entity.

The default value is Low .

Retrieve AI Summary

Optional.

If selected, the action retrieves an AI summary for the submitted file.

The AI summary is available for private submissions only.

This parameter is experimental.

Not selected by default.

Max Comments To Return

Optional.

The maximum number of comments to return in every action run.

Linux Server Address

Optional.

The IP address of the remote Linux server where the file is located.

Linux Username

Optional.

The username of the remote Linux server where the file is located.

Linux Password

Optional.

The password of the remote Linux server where the file is located.

Action outputs

The Submit Fileaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result. Available

The Submit Fileaction can return the following link:

Report Link PATH : URL

JSON result

The following example shows the JSON result output received when using the Submit Fileaction:

  { 
  
 "data" 
 : 
  
 { 
  
 "attributes" 
 : 
  
 { 
  
 "categories" 
 : 
  
 { 
  
 "Dr.Web" 
 : 
  
 "known infection source/not recommended site" 
 , 
  
 "Forcepoint ThreatSeeker" 
 : 
  
 "compromised websites" 
 , 
  
 "sophos" 
 : 
  
 "malware repository, spyware and malware" 
  
 }, 
  
 "first_submission_date" 
 : 
  
 1582300443 
 , 
  
 "html_meta" 
 : 
  
 {}, 
  
 "last_analysis_date" 
 : 
  
 1599853405 
 , 
  
 "last_analysis_results" 
 : 
  
 { 
  
 "ADMINUSLabs" 
 : 
  
 { 
  
 "category" 
 : 
  
 "harmless" 
 , 
  
 "engine_name" 
 : 
  
 "ADMINUSLabs" 
 , 
  
 "method" 
 : 
  
 "blacklist" 
 , 
  
 "result" 
 : 
  
 "clean" 
  
 }, 
  
 "AegisLab WebGuard" 
 : 
  
 { 
  
 "category" 
 : 
  
 "harmless" 
 , 
  
 "engine_name" 
 : 
  
 "AegisLab WebGuard" 
 , 
  
 "method" 
 : 
  
 "blacklist" 
 , 
  
 "result" 
 : 
  
 "clean" 
  
 }, 
  
 }, 
  
 "last_analysis_stats" 
 : 
  
 { 
  
 "harmless" 
 : 
  
 64 
 , 
  
 "malicious" 
 : 
  
 6 
 , 
  
 "suspicious" 
 : 
  
 1 
 , 
  
 "timeout" 
 : 
  
 0 
 , 
  
 "undetected" 
 : 
  
 8 
  
 }, 
  
 "last_final_url" 
 : 
  
 "http://192.0.2.15/input/?mark=20200207-example.com/31mawe&tpl= ID 
&engkey=bar+chart+click+event" 
 , 
  
 "last_http_response_code" 
 : 
  
 404 
 , 
  
 "last_http_response_content_length" 
 : 
  
 204 
 , 
  
 "last_http_response_content_sha256" 
 : 
  
 " HASH_VALUE 
" 
 , 
  
 "last_http_response_headers" 
 : 
  
 { 
  
 "connection" 
 : 
  
 "keep-alive" 
 , 
  
 "content-length" 
 : 
  
 "204" 
 , 
  
 "content-type" 
 : 
  
 "text/html; charset=iso-8859-1" 
 , 
  
 "date" 
 : 
  
 "Fri, 11 Sep 2020 19:51:50 GMT" 
 , 
  
 "keep-alive" 
 : 
  
 "timeout=60" 
 , 
  
 "server" 
 : 
  
 "nginx" 
  
 }, 
  
 "last_modification_date" 
 : 
  
 1599853921 
 , 
  
 "last_submission_date" 
 : 
  
 1599853405 
 , 
  
 "reputation" 
 : 
  
 0 
 , 
  
 "tags" 
 : 
  
 [ 
  
 "ip" 
  
 ], 
  
 "targeted_brand" 
 : 
  
 {}, 
  
 "threat_names" 
 : 
  
 [ 
  
 "Mal/HTMLGen-A" 
  
 ], 
  
 "times_submitted" 
 : 
  
 3 
 , 
  
 "title" 
 : 
  
 "404 Not Found" 
 , 
  
 "total_votes" 
 : 
  
 { 
  
 "harmless" 
 : 
  
 0 
 , 
  
 "malicious" 
 : 
  
 0 
  
 }, 
  
 "trackers" 
 : 
  
 {}, 
  
 "url" 
 : 
  
 "http://192.0.2.15/input/?mark=20200207-example.com/31mawe&tpl= ID 
&engkey=bar+chart+click+event" 
  
 }, 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "links" 
 : 
  
 { 
  
 "self" 
 : 
  
 "https://www.virustotal.com/api/v3/urls/ ID 
" 
  
 }, 
  
 "type" 
 : 
  
 "url" 
 , 
  
 "comments" 
 : 
  
 [ 
 "text" 
 : 
  
 "attributes/text" 
 , 
 "date" 
 : 
  
 "attributes/date" 
 ] 
  
 } 
  
 "is_risky" 
 : 
  
 true 
 , 
 "related_mitre_techniques" 
 : 
  
 [{ 
 "id" 
 : 
  
 "T1071" 
 , 
  
 "name" 
 : 
  
 "" 
 , 
  
 "severity" 
 : 
  
 "" 
 }], 
 "related_mitre_tactics" 
 : 
  
 [{ 
 "id" 
 : 
 "TA0011" 
 , 
  
 "name" 
 : 
  
 "" 
 }], 
 "generated_ai_summary" 
  
 : 
  
 "summary_text_here…" 
 } 
 
Output messages

The Submit Fileaction can return the following output messages:

Output message Message description

Successfully returned details about the following files using Google Threat Intelligence: PATHS .

The action wasn't able to return details about the following files using Google Threat Intelligence: PATHS .

The action wasn't able to find the following files: PATHS .

The action didn't retrieve any details about the files or none of the files were found.

The action is waiting for results for the following files: PATHS .

The action failed to fetch an AI summary for the following files: PATHS . To generate AI summary, check for sufficient permissions and try again.

The action succeeded.
Error executing action "Submit File". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Error executing action "Submit File". Reason: ERROR_REASON

No "File Paths" or "External URLs" values

At least one of "File Paths" or "External URLs" parameters should have a value.

Script result

The following table lists the value for the script result output when using the Submit Fileaction:

Script result name Value
is_success True or False

Update ASM Issue

Use the Update ASM Issueaction to update an ASM issue in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Update ASM Issueaction requires the following parameters:

Parameter
Description
Issue ID

Required.

The ID of the issue to update.

Status

Required.

The new status to set for the issue.

The possible values are as follows:

  • Select One
  • New
  • Triaged
  • In Progress
  • Resolved
  • Duplicate
  • Out Of Scope
  • Not A Security Issue (Benign)
  • Risk Accepted
  • False Positive
  • Unable To Reproduce
  • Tracked Externally
  • Mitigated

The default value is Select One . If you use the default value, the action fails.

Action outputs

The Update ASM Issueaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Update ASM Issueaction:

  { 
  
 "success" 
 : 
  
 true 
 , 
  
 "message" 
 : 
  
 "Successfully reported status as open_new" 
 , 
  
 "result" 
 : 
  
 "open_new" 
 } 
 
Output messages

The Update ASM Issueaction can return the following output messages:

Output message Message description
Successfully updated issue with ID " ISSUE_ID " in Google Threat Intelligence. The action succeeded.
Error executing action "Update ASM Issue". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Update ASM Issueaction:

Script result name Value
is_success True or False

Update DTM Alert

Use the Update DTM Alertaction to update a Mandiant Digital Threat Monitoring alert in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

The Update DTM Alertaction requires the following parameters:

Parameters
Description
Alert ID

Required.

The ID of the alert to update.

Status

Optional.

The new status to set for the alert.

The possible values are as follows:

  • Select One
  • New
  • Read
  • Resolved
  • Escalated
  • In Progress
  • No Action Required
  • Duplicate
  • Not Relevant
  • Tracked Externally

The default value is Select One . If you use the default value, the action fails.

Action outputs

The Update DTM Alertaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Update DTM Alertaction:

  { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "monitor_id" 
 : 
  
 " MONITOR_ID 
" 
 , 
  
 "topic_matches" 
 : 
  
 [ 
  
 { 
  
 "topic_id" 
 : 
  
 "4a6ffb0f-e90d-46ce-b10a-3a1e24fbe70d" 
 , 
  
 "value" 
 : 
  
 "ap-southeast-1.example.com" 
 , 
  
 "term" 
 : 
  
 "lwd" 
 , 
  
 "offsets" 
 : 
  
 [ 
  
 26 
 , 
  
 29 
  
 ] 
  
 }, 
  
 { 
  
 "topic_id" 
 : 
  
 "doc_type:domain_discovery" 
 , 
  
 "value" 
 : 
  
 "domain_discovery" 
  
 } 
  
 ], 
  
 "label_matches" 
 : 
  
 [], 
  
 "doc_matches" 
 : 
  
 [], 
  
 "tags" 
 : 
  
 [], 
  
 "created_at" 
 : 
  
 "2024-05-31T12:27:43.475Z" 
 , 
  
 "updated_at" 
 : 
  
 "2024-05-31T12:43:20.399Z" 
 , 
  
 "labels_url" 
 : 
  
 "https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ ID 
/labels" 
 , 
  
 "topics_url" 
 : 
  
 "https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ ID 
/topics" 
 , 
  
 "doc_url" 
 : 
  
 "https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ ID 
" 
 , 
  
 "status" 
 : 
  
 "closed" 
 , 
  
 "alert_type" 
 : 
  
 "Domain Discovery" 
 , 
  
 "alert_summary" 
 : 
  
 "See alert content for details" 
 , 
  
 "title" 
 : 
  
 "Suspicious domain \"ap-southeast-1.example.com\" similar to \"lwd\"" 
 , 
  
 "email_sent_at" 
 : 
  
 "" 
 , 
  
 "severity" 
 : 
  
 "medium" 
 , 
  
 "confidence" 
 : 
  
 0.5 
 , 
  
 "has_analysis" 
 : 
  
 false 
 , 
  
 "monitor_version" 
 : 
  
 2 
 } 
 
Output messages

The Update DTM Alertaction can return the following output messages:

Output message Message description
Successfully updated alert with ID INCIDENT_ID in Google Threat Monitoring. Action succeeded.
Error executing action "Update DTM Alert". Reason: ERROR_REASON

Action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Update DTM Alertaction:

Script result name Value
is_success True or False

Connectors

For more detail about how to configure connectors in Google SecOps, see Ingest your data (connectors) .

Google Threat Intelligence - DTM Alerts Connector

Use the Google Threat Intelligence - DTM Alerts Connectorto retrieve alerts from Google Threat Intelligence. To work with a dynamic list, use the alert_type parameter.

Connector inputs

The Google Threat Intelligence - DTM Alerts Connectorrequires the following parameters:

Parameter
Description
Product Field Name

Required.

The name of the field where the product name is stored.

The default value is Product Name .

The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.

Event Field Name

Required.

The name of the field that determines the event name (subtype).

The default value is event_type .

Environment Field Name

Optional.

The name of the field where the environment name is stored.

If the environment field is missing, the connector uses the default value.

The default value is "" .

Environment Regex Pattern

Optional.

A regular expression pattern to run on the value found in the Environment Field Name field. This parameter lets you manipulate the environment field using the regular expression logic.

Use the default value .* to retrieve the required raw Environment Field Name value.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout

Required.

The timeout limit, in seconds, for the Python process that runs the current script.

The default value is 180 .

API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value is https://www.virustotal.com .

API Key

Required.

The Google Threat Intelligence API key.

Lowest Severity To Fetch

Optional.

The lowest severity of the alerts to retrieve.

If you don't configure this parameter, the connector ingests alerts with all severity levels.

The possible values are as follows:

  • Low
  • Medium
  • High
Monitor ID Filter

Optional.

A comma-separated list of monitor IDs to retrieve the alerts.

Disable Overflow

Optional.

If selected, the connector ignores the Google SecOps overflow mechanism.

Selected by default.

Max Hours Backwards

Required.

The number of hours prior to now to retrieve alerts.

This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp.

The default value is 1 .

Max Alerts To Fetch

Required.

The number of alerts to process in every connector iteration.

The maximum value is 25 . The default value is 25 .

Use dynamic list as a blocklist

Required.

If selected, the connector uses the dynamic list as a blocklist.

Not selected by default.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server.

Selected by default.

Proxy Server Address

Optional.

The address of the proxy server to use.

Proxy Username

Optional.

The proxy username to authenticate with.

Proxy Password

Optional.

The proxy password to authenticate with.

Connector rules

The Google Threat Intelligence - DTM Alerts Connectorsupports proxies.

Connector events

There are two types of events for the Google Threat Intelligence - DTM Alerts Connector: an event that is based on the main alert and an event that is based on a topic.

An example of the connector event based on the main alert is as follows:

  { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "event_type" 
 : 
  
 "Main Alert" 
 , 
  
 "monitor_id" 
 : 
  
 " MONITOR_ID 
" 
 , 
  
 "doc" 
 : 
  
 { 
  
 "__id" 
 : 
  
 "6ed37932-b74e-4253-aa69-3eb4b00d0ea2" 
 , 
  
 "__type" 
 : 
  
 "account_discovery" 
 , 
  
 "ingested" 
 : 
  
 "2024-05-20T16:15:53Z" 
 , 
  
 "service_account" 
 : 
  
 { 
  
 "login" 
 : 
  
 "user@example.com" 
 , 
  
 "password" 
 : 
  
 { 
  
 "plain_text" 
 : 
  
 "********" 
  
 }, 
  
 "profile" 
 : 
  
 { 
  
 "contact" 
 : 
  
 { 
  
 "email" 
 : 
  
 "user@example.com" 
 , 
  
 "email_domain" 
 : 
  
 "example.com" 
  
 } 
  
 }, 
  
 "service" 
 : 
  
 { 
  
 "inet_location" 
 : 
  
 { 
  
 "domain" 
 : 
  
 "www.example-service.com" 
 , 
  
 "path" 
 : 
  
 "/signin/app" 
 , 
  
 "protocol" 
 : 
  
 "https" 
 , 
  
 "url" 
 : 
  
 "https://www.example-service.com/signin/app" 
  
 }, 
  
 "name" 
 : 
  
 "www.example-service.com" 
  
 } 
  
 }, 
  
 "source" 
 : 
  
 "ccmp" 
 , 
  
 "source_file" 
 : 
  
 { 
  
 "filename" 
 : 
  
 "urlloginpass ap.txt" 
 , 
  
 "hashes" 
 : 
  
 { 
  
 "md5" 
 : 
  
 "c401baa01fbe311753b26334b559d945" 
 , 
  
 "sha1" 
 : 
  
 "bf700f18b6ab562afb6128b42a34ae088f9c7434" 
 , 
  
 "sha256" 
 : 
  
 "5e6302d95a7e7edb28d68926cede0c44babded720ad1cc9a72c12d8c6d66153f" 
  
 }, 
  
 "size" 
 : 
  
 84161521407 
  
 }, 
  
 "source_url" 
 : 
  
 "https://example.com" 
 , 
  
 "timestamp" 
 : 
  
 "2023-11-14T20:09:04Z" 
  
 }, 
  
 "labels" 
 : 
  
 "Label" 
 , 
  
 "topic_matches" 
 : 
  
 [ 
  
 { 
  
 "topic_id" 
 : 
  
 "doc_type:account_discovery" 
 , 
  
 "value" 
 : 
  
 "account_discovery" 
  
 } 
  
 ], 
  
 "label_matches" 
 : 
  
 [], 
  
 "doc_matches" 
 : 
  
 [ 
  
 { 
  
 "match_path" 
 : 
  
 "service_account.profile.contact.email_domain" 
 , 
  
 "locations" 
 : 
  
 [ 
  
 { 
  
 "offsets" 
 : 
  
 [ 
  
 0 
 , 
  
 9 
  
 ], 
  
 "value" 
 : 
  
 "example.com" 
  
 } 
  
 ] 
  
 } 
  
 ], 
  
 "tags" 
 : 
  
 [], 
  
 "created_at" 
 : 
  
 "2024-05-20T16:16:52.439Z" 
 , 
  
 "updated_at" 
 : 
  
 "2024-05-30T12:10:56.691Z" 
 , 
  
 "labels_url" 
 : 
  
 "https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ ID 
/labels" 
 , 
  
 "topics_url" 
 : 
  
 "https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ ID 
/topics" 
 , 
  
 "doc_url" 
 : 
  
 "https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ ID 
" 
 , 
  
 "status" 
 : 
  
 "read" 
 , 
  
 "alert_type" 
 : 
  
 "Compromised Credentials" 
 , 
  
 "alert_summary" 
 : 
  
 "ccmp" 
 , 
  
 "title" 
 : 
  
 "Leaked Credentials found for domain \"example.com\"" 
 , 
  
 "email_sent_at" 
 : 
  
 "" 
 , 
  
 "indicator_mscore" 
 : 
  
 60 
 , 
  
 "severity" 
 : 
  
 "high" 
 , 
  
 "confidence" 
 : 
  
 0.9999995147741939 
 , 
  
 "aggregated_under_id" 
 : 
  
 " ID 
" 
 , 
  
 "monitor_name" 
 : 
  
 "Compromised Credentials - Example" 
 , 
  
 "has_analysis" 
 : 
  
 false 
 , 
  
 "meets_password_policy" 
 : 
  
 "policy_unset" 
 , 
  
 "monitor_version" 
 : 
  
 1 
 } 
 

An example of the connector event based on a topic is as follows:

  { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "event_type" 
 : 
  
 "location_name" 
 , 
  
 "location_name" 
 : 
  
 " LOCATION_NAME 
" 
 , 
  
 "timestamp" 
 : 
  
 "2024-05-25T10:56:17.201Z" 
 , 
  
 "type" 
 : 
  
 "location_name" 
 , 
  
 "value" 
 : 
  
 " LOCATION_NAME 
" 
 , 
  
 "extractor" 
 : 
  
 "analysis-pipeline.nerprocessor-nerenglish-gpu" 
 , 
  
 "extractor_version" 
 : 
  
 "4-0-2" 
 , 
  
 "confidence" 
 : 
  
 100 
 , 
  
 "entity_locations" 
 : 
  
 [ 
  
 { 
  
 "element_path" 
 : 
  
 "body" 
 , 
  
 "offsets" 
 : 
  
 [ 
  
 227 
 , 
  
 229 
  
 ] 
  
 } 
  
 ] 
 } 
 

Google Threat Intelligence - ASM Issues Connector

Use the Google Threat Intelligence - ASM Issues Connectorto retrieve information about the ASM issues from Google Threat Intelligence. To work with the dynamic list filter, use the category parameter.

Connector inputs

The Google Threat Intelligence - ASM Issues Connectorrequires the following parameters:

Parameter
Description
Product Field Name

Required.

The name of the field where the product name is stored.

The default value is Product Name .

The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.

Event Field Name

Required.

The name of the field that determines the event name (subtype).

The default value is entity_type .

Environment Field Name

Optional.

The name of the field where the environment name is stored.

If the environment field is missing, the connector uses the default value.

The default value is "" .

Environment Regex Pattern

Optional.

A regular expression pattern to run on the value found in the Environment Field Name field. This parameter lets you manipulate the environment field using the regular expression logic.

Use the default value .* to retrieve the required raw Environment Field Name value.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout

Required.

The timeout limit, in seconds, for the Python process that runs the current script.

The default value is 180 .

API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value is https://www.virustotal.com .

API Key

Required.

The Google Threat Intelligence API key.

Project Name

Optional.

The name of the ASM project.

If you don't set a value, only alerts from collections in the primary project are returned.

Lowest Severity To Fetch

Optional.

The lowest severity of the alerts to retrieve.

If you don't configure this parameter, the connector ingests alerts with all severity levels.

The possible values are as follows:

  • Critical
  • High
  • Medium
  • Low
  • Informational
Max Hours Backwards

Required.

The number of hours prior to now to retrieve alerts.

This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp.

The default value is 1 .

Max Issues To Fetch

Required.

The number of issues to process in every connector iteration.

The maximum value is 100 . The default value is 10 .

Disable Overflow

Optional.

If selected, the connector ignores the Google SecOps overflow mechanism.

Selected by default.

Use dynamic list as a blocklist

Required.

If selected, the connector uses the dynamic list as a blocklist.

Not selected by default.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server.

Selected by default.

Proxy Server Address

Optional.

The address of the proxy server to use.

Proxy Username

Optional.

The proxy username to authenticate with.

Proxy Password

Optional.

The proxy password to authenticate with.

Connector events

The example of the Google Threat Intelligence - ASM Issues Connectorevent is as follows:

  { 
  
 "uuid" 
 : 
  
 " UUID 
" 
 , 
  
 "dynamic_id" 
 : 
  
 25590288 
 , 
  
 "entity_uid" 
 : 
  
 "9bae9d6f931c5405ad95f0a51954cf8f7193664f0808aadc41c8b25e08eb9bc3" 
 , 
  
 "alias_group" 
 : 
  
 null 
 , 
  
 "category" 
 : 
  
 "vulnerability" 
 , 
  
 "confidence" 
 : 
  
 "confirmed" 
 , 
  
 "description" 
 : 
  
 "A crafted request uri-path can cause mod_proxy to forward the request to an origin server chosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier." 
 , 
  
 "details" 
 : 
  
 { 
  
 "added" 
 : 
  
 "2021-10-15" 
 , 
  
 "proof" 
 : 
  
 "The following resolver IP Address: 203.0.113.132:50408 invoked a DNS Lookup with the following data <empty> at 2023-02-03T03:41:48Z using the UUID associated with this entity." 
 , 
  
 "status" 
 : 
  
 "confirmed" 
 , 
  
 "severity" 
 : 
  
 1 
 , 
  
 "references" 
 : 
  
 [ 
  
 { 
  
 "uri" 
 : 
  
 "https://example.com/vuln/detail/CVE-2021-40438" 
 , 
  
 "type" 
 : 
  
 "description" 
  
 }, 
  
 { 
  
 "uri" 
 : 
  
 "https://httpd.example.org/security/vulnerabilities_24.html" 
 , 
  
 "type" 
 : 
  
 "description" 
  
 }, 
  
 { 
  
 "uri" 
 : 
  
 "https://example.com/cve-2021-40438" 
 , 
  
 "type" 
 : 
  
 "description" 
  
 } 
  
 ], 
  
 "remediation" 
 : 
  
 null 
  
 }, 
  
 "first_seen" 
 : 
  
 "2022-11-28T03:24:48.000Z" 
 , 
  
 "identifiers" 
 : 
  
 [ 
  
 { 
  
 "name" 
 : 
  
 "CVE-2021-40438" 
 , 
  
 "type" 
 : 
  
 "CVE" 
  
 } 
  
 ], 
  
 "last_seen" 
 : 
  
 "2023-02-03T03:41:48.000Z" 
 , 
  
 "name" 
 : 
  
 "cve_2021_40438" 
 , 
  
 "pretty_name" 
 : 
  
 "Apache HTTP Server Side Request Forgery (CVE-2021-40438)" 
 , 
  
 "scoped" 
 : 
  
 true 
 , 
  
 "severity" 
 : 
  
 1 
 , 
  
 "source" 
 : 
  
 null 
 , 
  
 "status" 
 : 
  
 "open_in_progress" 
 , 
  
 "ticket_list" 
 : 
  
 null 
 , 
  
 "type" 
 : 
  
 "standard" 
 , 
  
 "uid" 
 : 
  
 " UID 
" 
 , 
  
 "upstream" 
 : 
  
 "intrigue" 
 , 
  
 "created_at" 
 : 
  
 "2022-11-28T03:34:31.124Z" 
 , 
  
 "updated_at" 
 : 
  
 "2023-02-03T04:03:44.126Z" 
 , 
  
 "entity_id" 
 : 
  
 298912419 
 , 
  
 "collection_id" 
 : 
  
 117139 
 , 
  
 "collection" 
 : 
  
 "example_oum28bu" 
 , 
  
 "collection_type" 
 : 
  
 "user_collection" 
 , 
  
 "collection_uuid" 
 : 
  
 "511311a6-6ff4-4933-8f5b-f1f7df2f6a3e" 
 , 
  
 "organization_uuid" 
 : 
  
 "21d2d125-d398-4bcb-bae1-11aee14adcaf" 
 , 
  
 "entity_name" 
 : 
  
 "http://192.0.2.73:80" 
 , 
  
 "entity_type" 
 : 
  
 "Intrigue::Entity::Uri" 
 , 
  
  
 "Intrigue::Entity::Uri" 
 : 
  
 "http://192.0.2.73:80" 
 , 
  
 "summary" 
 : 
  
 { 
  
 "pretty_name" 
 : 
  
 "Apache HTTP Server Side Request Forgery (CVE-2021-40438)" 
 , 
  
 "severity" 
 : 
  
 1 
 , 
  
 "scoped" 
 : 
  
 true 
 , 
  
 "confidence" 
 : 
  
 "confirmed" 
 , 
  
 "status" 
 : 
  
 "open_in_progress" 
 , 
  
 "category" 
 : 
  
 "vulnerability" 
 , 
  
 "identifiers" 
 : 
  
 [ 
  
 { 
  
 "name" 
 : 
  
 "CVE-2021-40438" 
 , 
  
 "type" 
 : 
  
 "CVE" 
  
 "CVE" 
 : 
  
 "CVE-2021-40438" 
  
 } 
  
 ], 
  
 "status_new" 
 : 
  
 "open" 
 , 
  
 "status_new_detailed" 
 : 
  
 "in_progress" 
 , 
  
 "ticket_list" 
 : 
  
 null 
  
 }, 
  
 "tags" 
 : 
  
 [] 
 } 
 

Google Threat Intelligence - Livehunt Connector

Use the Google Threat Intelligence - Livehunt Connectorto retrieve information about the Livehunt notifications and their related files from Google Threat Intelligence. To work with the dynamic list, use the rule_name parameter.

Connector inputs

The Google Threat Intelligence - Livehunt Connectorrequires the following parameters:

Parameter Description
Product Field Name

Required.

The name of the field where the product name is stored.

The default value is Product Name .

The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.

Event Field Name

Required.

The name of the field that determines the event name (subtype).

The default value is type .

Environment Field Name

Optional.

The name of the field where the environment name is stored.

If the environment field is missing, the connector uses the default value.

The default value is "" .

Environment Regex Pattern

Optional.

A regular expression pattern to run on the value found in the Environment Field Name field. This parameter lets you manipulate the environment field using the regular expression logic.

Use the default value .* to retrieve the required raw Environment Field Name value.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout

Required.

The timeout limit, in seconds, for the Python process that runs the current script.

The default value is 180 .

API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value is https://www.virustotal.com .

API Key

Required.

The Google Threat Intelligence API key.

Max Hours Backwards

Required.

The number of hours prior to now to retrieve alerts.

This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp.

The default value is 1 .

Max Notifications To Fetch

Required.

The number of notifications to process in every connector iteration.

The default value is 40 .

Disable Overflow

Optional.

If selected, the connector ignores the Google SecOps overflow mechanism.

Selected by default.

Use dynamic list as a blocklist

Required.

If selected, the connector uses the dynamic list as a blocklist.

Not selected by default.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server.

Selected by default.

Proxy Server Address

Optional.

The address of the proxy server to use.

Proxy Username

Optional.

The proxy username to authenticate with.

Proxy Password

Optional.

The proxy password to authenticate with.

Connector rules

The Google Threat Intelligence - Livehunt Connectorsupports proxies.

Connector events

The example of the Google Threat Intelligence - Livehunt Connectorevent is as follows:

  { 
  
 "attributes" 
 : 
  
 { 
  
 "type_description" 
 : 
  
 "Win32 DLL" 
 , 
  
 "tlsh" 
 : 
  
 "T1E6A25B41AF6020B3EAF508F135F6D913A930B7110AA4C957774B86511FB4BC3BE7AA2D" 
 , 
  
 "vhash" 
 : 
  
 "124056651d15155bzevz36z1" 
 , 
  
< ! 
  
 CONTENT 
  
 OMITTED 
  
  
>  
 "last_analysis_date" 
 : 
  
 1645620534 
 , 
  
 "unique_sources" 
 : 
  
 8 
 , 
  
 "first_submission_date" 
 : 
  
 1562871116 
 , 
  
 "sha1" 
 : 
  
 "3de080d32b14a88a5e411a52d7b43ff261b2bf5e" 
 , 
  
 "ssdeep" 
 : 
  
 "384:wBvtsqUFEjxcAfJ55oTiwO5xOJuqn2F9BITqGBRnYPLxDG4y8jm+:e1YOcAfGnOmJuqn2LBITqGfWDG4yR+" 
 , 
  
 "md5" 
 : 
  
 "6a796088cd3d1b1d6590364b9372959d" 
 , 
  
 "magic" 
 : 
  
 "PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit" 
 , 
  
 "last_analysis_stats" 
 : 
  
 { 
  
 "harmless" 
 : 
  
 0 
 , 
  
 "type-unsupported" 
 : 
  
 5 
 , 
  
 "suspicious" 
 : 
  
 0 
 , 
  
 "confirmed-timeout" 
 : 
  
 0 
 , 
  
 "timeout" 
 : 
  
 14 
 , 
  
 "failure" 
 : 
  
 4 
 , 
  
 "malicious" 
 : 
  
 0 
 , 
  
 "undetected" 
 : 
  
 49 
  
 }, 
  
 "reputation" 
 : 
  
 0 
 , 
  
 "first_seen_itw_date" 
 : 
  
 1536433291 
  
 }, 
  
 "type" 
 : 
  
 "file" 
 , 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "links" 
 : 
  
 { 
  
 "self" 
 : 
  
 "https://www.virustotal.com/api/v3/files/ ID 
" 
  
 }, 
  
 "context_attributes" 
 : 
  
 { 
  
 "notification_id" 
 : 
  
 "6425310189355008-7339e39660589ca2ec996c1c15ca5989- ID 
-1645620534" 
 , 
  
 "notification_source_key" 
 : 
  
 " KEY 
" 
 , 
  
 "notification_tags" 
 : 
  
 [ 
  
 "cve_pattern" 
 , 
  
 " ID 
" 
 , 
  
 "cverules" 
  
 ], 
  
 "ruleset_name" 
 : 
  
 "cverules" 
 , 
  
 "notification_source_country" 
 : 
  
 "KR" 
 , 
  
 "rule_name" 
 : 
  
 "cve_pattern" 
 , 
  
 "notification_snippet" 
 : 
  
 "" 
 , 
  
 "ruleset_id" 
 : 
  
 "6425310189355008" 
 , 
  
 "rule_tags" 
 : 
  
 [], 
  
 "notification_date" 
 : 
  
 1645620832 
 , 
  
 "match_in_subfile" 
 : 
  
 false 
  
 } 
 } 
 

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: