Integrate Google Threat Intelligence with Google SecOps
This document explains how to integrate Google Threat Intelligence with Google Security Operations (Google SecOps).
Integration version: 1.0
Before you begin
To use the integration, you need an API key. For more information, see Google Threat Intelligence API keys
Integration parameters
The Google Threat Intelligence integration requires the following parameters:
Parameter | Description |
---|---|
API Root
|
Required. The API root of the Google Threat Intelligence instance. The default value is |
API Key
|
Required. The Google Threat Intelligence API key. |
ASM Project Name
|
Optional. The Mandiant Attack Surface Management (ASM) project name to use in the integration. This parameter is required to run the Search ASM Entities , Search ASM Issues and Update ASM Issue actions. If no value is set, only alerts from collections in the primary project are returned. |
Verify SSL
|
Required. If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server. Selected by default. |
For instructions about how to configure an integration in Google SecOps, see Configure integrations .
You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances .
Actions
For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action .
Add Comment To Entity
Use the Add Comment To Entityaction to add comments to Google SecOps entities in Google Threat Intelligence.
This action only supports the MD5, SHA-1, and SHA-256 hashes.
This action runs on the following Google SecOps entities:
-
Domain
-
File Hash
-
Hostname
-
IP Address
-
URL
Action inputs
The Add Comment To Entityaction requires the following parameters:
Parameter | Description |
---|---|
Comment
|
Required. A comment to add to all supported entities. |
Action outputs
The Add Comment To Entityaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result outputs received when using the Add Comment To Entityaction:
{
"Status"
:
"Done"
}
{
"Status"
:
"Not done"
}
Output messages
The Add Comment To Entityaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add Comment To Entity". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Add Comment To Entityaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Add Vote To Entity
Use the Add Comment To Entityaction to add votes to Google SecOps entities in Google Threat Intelligence.
This action only supports the MD5, SHA-1, and SHA-256 hashes.
This action runs on the following Google SecOps entities:
-
Domain
-
File Hash
-
Hostname
-
IP Address
-
URL
Action inputs
The Add Vote To Entityaction requires the following parameters:
Vote
Required.
A vote to add to all supported entities.
The possible values are as follows:
-
Harmless
-
Malicious
The default value is Malicious
.
Action outputs
The Add Vote To Entityaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Add Vote To Entityaction:
{
"Status"
:
"Done"
}
{
"Status"
:
"Not done"
}
Output messages
The Add Vote To Entityaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add Vote To Entity". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Add Vote To Entityaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Download File
Use the Download Fileaction to download a file from Google Threat Intelligence.
This action runs on the Google SecOps Hash
entity.
This action only supports the MD5, SHA-1, and SHA-256 hashes.
Action inputs
The Download Fileaction requires the following parameters:
Parameter | Description |
---|---|
Download Folder Path
|
Required. The path to the folder to store downloaded files. |
Overwrite
|
Required. If selected, the action overwrites an existing file with the new file if the filenames are identical. Selected by default. |
Action outputs
The Download Fileaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Download Fileaction:
{
"absolute_file_paths"
:
[
"file_path_1"
,
"file_path_2"
]
}
Output messages
The Download Fileaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Download File". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Enrich Entities
Use the Enrich Entitiesaction to enrich entities with information from Google Threat Intelligence.
This action supports the MD5, SHA-1, and SHA-256 hashes.
This action runs on the following Google SecOps entities:
-
Domain
-
Hash
-
Hostname
-
IP Address
-
URL
-
CVE
-
Threat Actor
Action inputs
The Enrich Entitiesaction requires the following parameters:
Resubmit Entity
Optional.
If selected, the action resubmits entities for analysis instead of using the entity information from the previous action run.
This parameter only supports the URL
and Hash
entities.
Not selected by default.
Resubmit After (Days)
Optional.
The number of days for the action to wait before
submitting the entity again. To use this parameter, select the Resubmit Entity
parameter.
The default value is 30
.
This parameter only supports the URL
and Hash
entities.
Sandbox
Optional.
A comma-separated list of sandbox names to analyze,
such as VirusTotal Jujubox, VirusTotal ZenBox, Microsoft Sysinternals,
Tencent HABO
.
This parameter only supports the Hash
entity.
If you don't set this parameter, the action uses the default
sandbox, which is VirusTotal Jujubox
.
Retrieve Sandbox Analysis
Optional.
If selected, the action retrieves the sandbox analysis for the entity and creates a separate section for every sandbox in the JSON result.
The action returns data for sandboxes that you
configured in the Sandbox
parameter.
This parameter only
supports the Hash
entity.
Not selected by default.
Fetch MITRE Details
Optional.
If selected, the action returns information about the related MITRE techniques and tactics.
This parameter only supports
the Hash
entity.
Not selected by default.
Lowest MITRE Technique Severity
Optional.
The lowest MITRE technique severity to return.
The action treats the Unknown
severity as Info
.
This parameter only supports the Hash
entity.
The possible values are as follows:
-
High
-
Medium
-
Low
-
Info
The default value is Medium
.
Retrieve Comments
Optional.
If selected, the action retrieves comments about the entity.
This parameter supports the following entities:
-
Domain
-
Hash
-
Hostname
-
IP Address
-
URL
Max Comments To Return
Optional.
The maximum number of comments to return for every action run.
The default value is 10
.
Action outputs
The Enrich Entitiesaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Available |
Case wall table | Not available |
Entity enrichment table | Available |
JSON result | Available |
Output messages | Available |
Script result. | Available |
Case wall link
The Enrich Entitiesaction can return the following links:
-
IOC:
https://www.virustotal.com/gui/ ENTITY_TYPE / ENTITY /detection
-
Threat actor:
https://www.virustotal.com/gui/collection/threat-actor-- ID
-
Vulnerability:
https://www.virustotal.com/gui/collection/vulnerability-- ID
Entity enrichment table
- The Enrich Entities action support the following entity enrichment for IP addresses :
- The Enrich Entities action support the following entity enrichment for URL :
- The Enrich Entities action support the following entity enrichment for Hash :
- The Enrich Entities action support the following entity enrichment for Domain/Hostname :
- The Enrich Entities action support the following entity enrichment for Threat Actor :
- The Enrich Entities action support the following entity enrichment for Vulnerability :
Enrichment field | Source (JSON key) | Applicability |
---|---|---|
GTI_id
|
id
|
When available in the JSON result. |
GTI_owner
|
as_owner
|
When available in the JSON result. |
GTI_asn
|
asn
|
When available in the JSON result. |
GTI_continent
|
continent
|
When available in the JSON result. |
GTI_country
|
country
|
When available in the JSON result. |
GTI_harmless_count
|
last_analysis_stats/harmless
|
When available in the JSON result. |
GTI_malicious_count
|
last_analysis_stats/malicious
|
When available in the JSON result. |
GTI_suspicious_count
|
last_analysis_stats/suspicious
|
When available in the JSON result. |
GTI_undetected_count
|
last_analysis_stats/undetected
|
When available in the JSON result. |
GTI_certificate_valid_not_after
|
validity/not_after
|
When available in the JSON result. |
GTI_certificate_valid_not_before
|
validity/not_before
|
When available in the JSON result. |
GTI_reputation
|
reputation
|
When available in the JSON result. |
GTI_tags
|
Comma-separated list of tags
|
When available in the JSON result. |
GTI_malicious_vote_count
|
total_votes/malicious
|
When available in the JSON result. |
GTI_harmless_vote_count
|
total_votes/harmless
|
When available in the JSON result. |
GTI_report_link
|
report_link
|
When available in the JSON result. |
GTI_widget_link
|
widget_url
|
When available in the JSON result. |
GTI_threat_score
|
gti_assessment.threat_score.value
|
When available in the JSON result. |
GTI_severity
|
gti_assessment.severity.value
|
When available in the JSON result. |
GTI_normalised_categories
|
CSV of
gti_assessment.contributing_factors.normalised_categories
|
When available in the JSON result. |
GTI_verdict
|
gti_assessment.verdict.value
|
When available in the JSON result. |
GTI_description
|
gti_assessment.description
|
When available in the JSON result. |
Enrichment field | Source (JSON key) | Applicability |
---|---|---|
GTI_id
|
id
|
When available in the JSON result. |
GTI_title
|
title
|
When available in the JSON result. |
GTI_last_http_response_code
|
last_http_response_code
|
When available in the JSON result. |
GTI_last_http_response_content_length
|
last_http_response_content_length
|
When available in the JSON result. |
GTI_threat_names
|
Comma-separated list of threat_names
|
When available in the JSON result. |
GTI_harmless_count
|
last_analysis_stats/harmless
|
When available in the JSON result. |
GTI_malicious_count
|
last_analysis_stats/malicious
|
When available in the JSON result. |
GTI_suspicious_count
|
last_analysis_stats/suspicious
|
When available in the JSON result. |
GTI_undetected_count
|
last_analysis_stats/undetected
|
When available in the JSON result. |
GTI_reputation
|
reputation
|
When available in the JSON result. |
GTI_tags
|
Comma-separated list of tags
|
When available in the JSON result. |
GTI_malicious_vote_count
|
total_votes/malicious
|
When available in the JSON result. |
GTI_harmless_vote_count
|
total_votes/harmless
|
When available in the JSON result. |
GTI_report_link
|
report_link
|
When available in the JSON result. |
GTI_widget_link
|
widget_url
|
When available in the JSON result. |
GTI_threat_score
|
gti_assessment.threat_score.value
|
When available in the JSON result. |
GTI_severity
|
gti_assessment.severity.value
|
When available in the JSON result. |
GTI_normalised_categories
|
CSV of
gti_assessment.contributing_factors.normalised_categories
|
When available in the JSON result. |
GTI_verdict
|
gti_assessment.verdict.value
|
When available in the JSON result. |
GTI_description
|
gti_assessment.description
|
When available in the JSON result. |
GTI_category_{attributes/categories/json key}
|
{attributes/categories/json key value}
|
When available in the JSON result. |
Enrichment field | Source (JSON key) | Applicability |
---|---|---|
GTI_id
|
id
|
When available in the JSON result. |
GTI_magic
|
magic
|
When available in the JSON result. |
GTI_md5
|
md5
|
When available in the JSON result. |
GTI_sha1
|
sha1
|
When available in the JSON result. |
GTI_sha256
|
sha256
|
When available in the JSON result. |
GTI_ssdeep
|
ssdeep
|
When available in the JSON result. |
GTI_tlsh
|
tlsh
|
When available in the JSON result. |
GTI_vhash
|
vhash
|
When available in the JSON result. |
GTI_meaningful_name
|
meaningful_name
|
When available in the JSON result. |
GTI_magic
|
Comma-separated list of names
|
When available in the JSON result. |
GTI_harmless_count
|
last_analysis_stats/harmless
|
When available in the JSON result. |
GTI_malicious_count
|
last_analysis_stats/malicious
|
When available in the JSON result. |
GTI_suspicious_count
|
last_analysis_stats/suspicious
|
When available in the JSON result. |
GTI_undetected_count
|
last_analysis_stats/undetected
|
When available in the JSON result. |
GTI_reputation
|
reputation
|
When available in the JSON result. |
GTI_tags
|
Comma-separated list of tags
|
When available in the JSON result. |
GTI_malicious_vote_count
|
total_votes/malicious
|
When available in the JSON result. |
GTI_harmless_vote_count
|
total_votes/harmless
|
When available in the JSON result. |
GTI_report_link
|
report_link
|
When available in the JSON result. |
GTI_widget_link
|
widget_url
|
When available in the JSON result. |
GTI_threat_score
|
gti_assessment.threat_score.value
|
When available in the JSON result. |
GTI_severity
|
gti_assessment.severity.value
|
When available in the JSON result. |
GTI_normalized_categories
|
CSV of gti_assessment.contributing_factors.normalised_categories
|
When available in the JSON result. |
GTI_verdict
|
gti_assessment.verdict.value
|
When available in the JSON result. |
GTI_description
|
gti_assessment.description
|
When available in the JSON result. |
GTI_exiftool_{json_key}
|
GTI_exiftool_{json_key.value}
|
Enrichment field | Source (JSON key) | Applicability |
---|---|---|
GTI_id
|
id
|
When available in the JSON result. |
GTI_harmless_count
|
last_analysis_stats/harmless
|
When available in the JSON result. |
GTI_malicious_count
|
last_analysis_stats/malicious
|
When available in the JSON result. |
GTI_suspicious_count
|
last_analysis_stats/suspicious
|
When available in the JSON result. |
GTI_undetected_count
|
last_analysis_stats/undetected
|
When available in the JSON result. |
GTI_reputation
|
reputation
|
When available in the JSON result. |
GTI_tags
|
Comma-separated list of tags
|
When available in the JSON result. |
GTI_malicious_vote_count
|
total_votes/malicious
|
When available in the JSON result. |
GTI_harmless_vote_count
|
total_votes/harmless
|
When available in the JSON result. |
GTI_report_link
|
report_link
|
When available in the JSON result. |
GTI_widget_link
|
widget_url
|
When available in the JSON result. |
GTI_threat_score
|
gti_assessment.threat_score.value
|
When available in the JSON result. |
GTI_severity
|
gti_assessment.severity.value
|
When available in the JSON result. |
GTI_normalized_categories
|
CSV of
gti_assessment.contributing_factors.normalised_categories
|
When available in the JSON result. |
GTI_verdict
|
gti_assessment.verdict.value
|
When available in the JSON result. |
GTI_description
|
gti_assessment.description
|
When available in the JSON result. |
GGTI_category_{attributes/categories/json key}
|
{attributes/categories/json key value}
|
When available in the JSON result. |
Enrichment field | Source (JSON key) | Applicability |
---|---|---|
GTI_motivations
|
Csv of motivations/name
|
When available in the JSON result. |
GTI_aliases
|
Csv of alt_names_details/value
|
When available in the JSON result. |
GTI_industries
|
Csv of targeted_industries/value
|
When available in the JSON result. |
GTI_malware
|
Csv of malware/name
|
When available in the JSON result. |
GTI_source_region
|
CSV of source_regions_hierarchy/country
|
When available in the JSON result. |
GTI_target_region
|
Csv of targeted_regions_hierarchy/country
|
When available in the JSON result. |
GTI_origin
|
origin
|
When available in the JSON result. |
GTI_description
|
description
|
When available in the JSON result. |
GTI_last_activity_time
|
last_activity_time
|
When available in the JSON result. |
GTI_report_link
|
We craft it.
|
When available in the JSON result. |
Enrichment field | Source (JSON key) | Applicability |
---|---|---|
GTI_sources
|
Csv of source_name
|
When available in the JSON result. |
GTI_exploitation_state
|
exploitation_state
|
When available in the JSON result. |
GTI_date_of_disclosure
|
date_of_disclosure
|
When available in the JSON result. |
GTI_vendor_fix_references
|
vendor_fix_references/url
|
When available in the JSON result. |
GTI_exploitation_vectors
|
Csv of exploitation_vectors
|
When available in the JSON result. |
GTI_description
|
description
|
When available in the JSON result. |
GTI_risk_rating
|
risk_rating
|
When available in the JSON result. |
GTI_available_mitigation
|
CSV of available_mitigation
|
When available in the JSON result. |
GTI_exploitation_consequence
|
exploitation_consequence
|
When available in the JSON result. |
GTI_report_link
|
We craft it.
|
When available in the JSON result. |
JSON result
The following example shows the JSON result output received when using the Enrich Entitiesaction:
{
[
{
"Entity"
:
" ENTITY_ID
"
,
"EntityResult"
:
{
"is_risky"
:
true
,
"attributes"
:
{
"authentihash"
:
" HASH_VALUE
"
,
"creation_date"
:
1410950077
,
"downloadable"
:
true
,
"exiftool"
:
{
"CharacterSet"
:
"Unicode"
,
"CodeSize"
:
"547xx"
,
"CompanyName"
:
"MySQL, AB"
,
"EntryPoint"
:
"0x39xx"
,
"FileDescription"
:
"WinMerge Shell Integration"
,
"FileFlagsMask"
:
"0x00xx"
,
"FileOS"
:
"Windows NT 32-bit"
,
"FileSubtype"
:
"0"
,
"FileType"
:
"Win32 EXE"
,
"FileTypeExtension"
:
"exe"
,
"FileVersion"
:
"1.0.1.6"
,
"FileVersionNumber"
:
"1.0.1.6"
,
"ImageFileCharacteristics"
:
"Executable, 32-bit"
,
"ImageVersion"
:
"0.0"
,
"InitializedDataSize"
:
"199168"
,
"InternalName"
:
"ShellExtension"
,
"LanguageCode"
:
"English (U.S.)"
,
"LegalCopyright"
:
"Copyright 2003-2013"
,
"LinkerVersion"
:
"10.0"
,
"MIMEType"
:
"application/octet-stream"
,
"MachineType"
:
"Intel 386 or later, and compatibles"
,
"OSVersion"
:
"5.1"
,
"ObjectFileType"
:
"Executable application"
,
"OriginalFileName"
:
"ShellExtension"
,
"PEType"
:
"PE32"
,
"ProductName"
:
"ShellExtension"
,
"ProductVersion"
:
"1.0.1.6"
,
"ProductVersionNumber"
:
"1.0.1.6"
,
"Subsystem"
:
"Windows GUI"
,
"SubsystemVersion"
:
"5.1"
,
"TimeStamp"
:
"2014:09:17 10:34:37+00:00"
,
"UninitializedDataSize"
:
"0"
},
"first_submission_date"
:
1411582812
,
"last_analysis_date"
:
1606903659
,
"last_analysis_results"
:
{
"ALYac"
:
{
"category"
:
"malicious"
,
"engine_name"
:
"ALYac"
,
"engine_update"
:
"20201202"
,
"engine_version"
:
"1.1.1.5"
,
"method"
:
"blacklist"
,
"result"
:
"Trojan.Foreign.Gen.2"
}
},
"last_analysis_stats"
:
{
"confirmed-timeout"
:
0
,
"failure"
:
0
,
"harmless"
:
0
,
"malicious"
:
61
,
"suspicious"
:
0
,
"timeout"
:
0
,
"type-unsupported"
:
5
,
"undetected"
:
10
},
"last_modification_date"
:
1606911051
,
"last_submission_date"
:
1572934476
,
"magic"
:
"PE32 executable for MS Windows (GUI) Intel 80386 32-bit"
,
"md5"
:
" MD5_HASH_VALUE
"
,
"meaningful_name"
:
"ShellExtension"
,
"names"
:
[
"ShellExtension"
,
"ZeuS_binary_ MD5_HASH_VALUE
.exe"
,
" MD5_HASH_VALUE
.exe"
,
" MD5_HASH_VALUE
"
,
"2420800"
,
" FILE_ID
.exe"
,
" NAME
.exe"
,
" NAME
.exe"
],
"reputation"
:
-49
,
"sha1"
:
" SHA1_HASH_VALUE
"
,
"sha256"
:
" SHA256_HASH_VALUE
"
,
"sigma_analysis_stats"
:
{
"critical"
:
0
,
"high"
:
0
,
"low"
:
4
,
"medium"
:
0
},
"sigma_analysis_summary"
:
{
"Sigma Integrated Rule Set (GitHub)"
:
{
"critical"
:
0
,
"high"
:
0
,
"low"
:
4
,
"medium"
:
0
}
},
"signature_info"
:
{
"copyright"
:
"Copyright 2003-2013"
,
"description"
:
"WinMerge Shell Integration"
,
"file version"
:
"1.0.1.6"
,
"internal name"
:
"ShellExtension"
,
"original name"
:
"ShellExtension"
,
"product"
:
"ShellExtension"
},
"size"
:
254976
,
"ssdeep"
:
"6144:Gz90qLc1zR98hUb4UdjzEwG+vqAWiR4EXePbix67CNzjX:Gz90qLc1lWhUbhVqxxxx"
,
"tags"
:
[
"peexe"
,
"runtime-modules"
,
"direct-cpu-clock-access"
],
"times_submitted"
:
8
,
"tlsh"
:
"T1DB44CF267660D833D0DF94316C75C3F9673BFC2123215A6B6A4417699E307Exxxx"
,
"total_votes"
:
{
"harmless"
:
2
,
"malicious"
:
7
},
"trid"
:
[
{
"file_type"
:
"Win32 Executable MS Visual C++ (generic)"
,
"probability"
:
54.3
},
{
"file_type"
:
"Win16 NE executable (generic)"
,
"probability"
:
12.2
},
{
"file_type"
:
"Win32 Dynamic Link Library (generic)"
,
"probability"
:
11.4
},
{
"file_type"
:
"Win32 Executable (generic)"
,
"probability"
:
7.8
},
{
"file_type"
:
"OS/2 Executable (generic)"
,
"probability"
:
3.5
}
],
"type_description"
:
"Win32 EXE"
,
"type_extension"
:
"exe"
,
"type_tag"
:
"peexe"
,
"unique_sources"
:
8
,
"vhash"
:
" HASH_VALUE
"
},
"id"
:
" ID
"
,
"links"
:
{
"self"
:
"https://www.virustotal.com/api/v3/files/ FILE_ID
"
},
"type"
:
"file"
,
"comments"
:
[
{
"attributes"
:
{
"date"
:
1595402790
,
"html"
:
"#malware #Zeus<br /><br />Full genetic report from Intezer Analyze:<br />https://analyze.intezer.com/#/files/ FILE_ID
<br /><br />#IntezerAnalyze"
,
"tags"
:
[
"malware"
,
"zeus"
,
"intezeranalyze"
],
"text"
:
"#malware #Zeus\n\nFull genetic report from Intezer Analyze:\nhttps://analyze.intezer.com/#/files/ FILE_ID
\n\n#IntezerAnalyze"
,
"votes"
:
{
"abuse"
:
0
,
"negative"
:
0
,
"positive"
:
0
}
},
"id"
:
"f- COMMENT_ID
"
,
"links"
:
{
"self"
:
"https://www.virustotal.com/api/v3/comments/ COMMENT_ID
"
},
"type"
:
"comment"
}
],
"widget_url"
:
"https://www.virustotal.com/ui/widget/html/ WIDGET_ID
"
,
"related_mitre_tactics"
:
[
{
"id"
:
"TA0002"
,
"name"
:
"Execution"
}
],
"related_mitre_techniques"
:
[
{
"id"
:
"T1129"
,
"name"
:
"Shared Modules"
,
"severity"
:
"INFO"
}
],
"sandboxes_analysis"
:
{
"VirusTotal Jujubox"
:
{
"attributes"
:
{
"registry_keys_opened"
:
[
"HKCU\\\\SOFTWARE\\\\Microsoft"
,
"SOFTWARE\\\\Microsoft\\\\Xuoc"
],
"calls_highlighted"
:
[
"GetTickCount"
],
"tags"
:
[
"DIRECT_CPU_CLOCK_ACCESS"
,
"RUNTIME_MODULES"
],
"files_written"
:
[
"C:\\\\Users\\\\ USER
\\\\AppData\\\\Roaming\\\\example.exe"
],
"mutexes_opened"
:
[
"Local\\\\"
],
"modules_loaded"
:
[
"ADVAPI32.dll"
],
"analysis_date"
:
1593005327
,
"sandbox_name"
:
"VirusTotal Jujubox"
,
"has_html_report"
:
true
,
"behash"
:
" HASH_VALUE
"
,
"has_evtx"
:
false
,
"text_highlighted"
:
[
"C:\\\\Windows\\\\system32\\\\cmd.exe"
],
"last_modification_date"
:
1593005327
,
"has_memdump"
:
false
,
"mutexes_created"
:
[
"Global\\\\"
],
"has_pcap"
:
true
,
"files_opened"
:
[
"C:\\\\Windows\\\\system32\\\\SXS.DLL"
]
},
"type"
:
"file_behaviour"
,
"id"
:
" FILE_ID
_VirusTotal Jujubox"
,
"links"
:
{
"self"
:
"https://www.virustotal.com/api/v3/file_behaviours/ FILE_ID
_VirusTotal Jujubox"
}
}
}
}
}
],
"is_risky"
:
true
}
Output messages
The Enrich Entitiesaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Enrich Entities". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Enrich Entitiesaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Enrich IOCs
Use the Enrich IOCsaction to enrich the indicators of compromise (IoCs) using information from Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Enrich IOCsaction requires the following parameters:
IOC Type
Optional.
The type of the IOC to enrich.
The possible values are as follows:
-
Filehash
-
URL
-
Domain
-
IP Address
The default value is Filehash
.
IOCs
Required.
A comma-separated list of IOCs to ingest data.
Action outputs
The Enrich IOCsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
Case wall link
The Enrich IOCsaction can provide the following link for every enriched entity:
Name: Report Link
Value: URL
Case wall table
The Enrich IOCsaction can provide the following table for every enriched entity:
Table name: IOC_ID
Table columns:
- Name
- Category
- Method
- Result
JSON result
The following example shows the JSON result output received when using the Enrich IOCsaction:
{
"ioc"
:
{
"identifier"
:
"203.0.113.1"
,
"details"
:
{
"attributes"
:
{
"categories"
:
{
"Dr.Web"
:
"known infection source/not recommended site"
,
"Forcepoint ThreatSeeker"
:
"compromised websites"
,
"sophos"
:
"malware repository, spyware and malware"
},
"first_submission_date"
:
1582300443
,
"html_meta"
:
{},
"last_analysis_date"
:
1599853405
,
"last_analysis_results"
:
{
"EXAMPLELabs"
:
{
"category"
:
"harmless"
,
"engine_name"
:
"EXAMPLELabs"
,
"method"
:
"blacklist"
,
"result"
:
"clean"
},
"Example"
:
{
"category"
:
"harmless"
,
"engine_name"
:
"Example"
,
"method"
:
"blacklist"
,
"result"
:
"clean"
}
},
"last_analysis_stats"
:
{
"harmless"
:
64
,
"malicious"
:
6
,
"suspicious"
:
1
,
"timeout"
:
0
,
"undetected"
:
8
},
"last_final_url"
:
"http://203.0.113.1/input/?mark=20200207-example.com/31mawe&tpl=example&engkey=bar+chart+click+event"
,
"last_http_response_code"
:
404
,
"last_http_response_content_length"
:
204
,
"last_http_response_content_sha256"
:
"58df637d178e35690516bda9e41e245db836170f046041fdebeedd20eca61d9d"
,
"last_http_response_headers"
:
{
"connection"
:
"keep-alive"
,
"content-length"
:
"204"
,
"content-type"
:
"text/html; charset=iso-8859-1"
,
"date"
:
"Fri, 11 Sep 2020 19:51:50 GMT"
,
"keep-alive"
:
"timeout=60"
,
"server"
:
"nginx"
},
"last_modification_date"
:
1599853921
,
"last_submission_date"
:
1599853405
,
"reputation"
:
0
,
"tags"
:
[
"ip"
],
"targeted_brand"
:
{},
"threat_names"
:
[
"Mal/HTMLGen-A"
],
"times_submitted"
:
3
,
"title"
:
"404 Not Found"
,
"total_votes"
:
{
"harmless"
:
0
,
"malicious"
:
0
},
"trackers"
:
{},
"url"
:
"http://203.0.113.1/input/?mark=20200207-example.com/31mawe&tpl=example&engkey=bar+chart+click+event"
},
"id"
:
" ID
"
,
"links"
:
{
"self"
:
"https://www.virustotal.com/api/v3/urls/ ID
"
},
"type"
:
"url"
,
"report_link"
:
"{generated report link}"
,
"widget_url"
:
"https: //www.virustotal.com/ui/widget/html/ WIDGET_ID
"
"widget_html"
}
}
}
Output messages
The Enrich IOCsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Enrich IOC". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Enrich IOCsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Execute IOC Search
Use the Execute IOC Searchaction to run the IOC search in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Execute IOC Searchaction requires the following parameters:
Parameter | Description |
---|---|
Search Query
|
Required. A search query to run, such as |
Max Results To Return
|
Optional. The maximum number of results to return for every action run. The maximum value is The default
value is |
Action outputs
The Execute IOC Searchaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Execute IOC Searchaction:
{
"attributes"
:{
"type_description"
:
"Android"
,
"tlsh"
:
"T156B6128BF7885D2BC0B78136899A1136B76A8D254B43A3473548772C3EB32D44F6DBD8"
,
"vhash"
:
"8d145b883d0a7f814ba5b130454fbf36"
,
"exiftool"
:{
"ZipRequiredVersion"
:
"20"
,
"MIMEType"
:
"application/zip"
,
"ZipCRC"
:
"0xf27716ce"
,
"FileType"
:
"ZIP"
,
"ZipCompression"
:
"Deflated"
,
"ZipUncompressedSize"
:
"46952"
,
"ZipCompressedSize"
:
"8913"
,
"FileTypeExtension"
:
"zip"
,
"ZipFileName"
:
"Example.xml"
,
"ZipBitFlag"
:
"0x0800"
,
"ZipModifyDate"
:
"2023:06:11 17:54:18"
},
"type_tags"
:[
"executable"
,
"mobile"
,
"android"
,
"apk"
],
"crowdsourced_yara_results"
:[
" RESULTS_OMITTED
"
]
"magic"
:
"Zip archive data, at least v1.0 to extract, compression method=store"
,
"permhash"
:
"a3e0005ad57d3ff03e09e0d055ad10bcf28a58a04a8c2aeccdad2b9e9bc52434"
,
"meaningful_name"
:
"Example"
,
"reputation"
:
0
},
"type"
:
"file"
,
"id"
:
" FILE_ID
"
,
"links"
:{
"self"
:
"https://www.virustotal.com/api/v3/files/ FILE_ID
"
}
}
Output messages
The Execute IOC Searchaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Execute IOC Search". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Execute IOC Searchaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get ASM Entity Details
Use the Get ASM Entity Detailsaction to obtain information about an ASM entity in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Get ASM Entity Detailsaction requires the following parameters:
Parameter | Description |
---|---|
Entity ID
|
Required. A comma-separated list of entity IDs to obtain details. |
Action outputs
The Get ASM Entity Detailsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get ASM Entity Detailsaction:
{
"uuid"
:
" UUID
"
,
"dynamic_id"
:
"Intrigue::Entity::Uri#http://192.0.2.73:80"
,
"collection_name"
:
"example_oum28bu"
,
"alias_group"
:
8515
,
"aliases"
:
[
"http://192.0.2.73:80"
],
"allow_list"
:
false
,
"ancestors"
:
[
{
"type"
:
"Intrigue::Entity::NetBlock"
,
"name"
:
"192.0.2.0/24"
}
],
"category"
:
null
,
"collection_naics"
:
null
,
"confidence"
:
null
,
"deleted"
:
false
,
"deny_list"
:
false
,
"details"
:
< !
CONTENT
OMITTED
—
>
"http"
:
{
"code"
:
404
,
"title"
:
"404 Not Found"
,
"content"
:
{
"favicon_hash"
:
null
,
"hash"
:
null
,
"forms"
:
false
},
"auth"
:
{
"any"
:
false
,
"basic"
:
false
,
"ntlm"
:
false
,
"forms"
:
false
,
"2fa"
:
false
}
},
"ports"
:
{
"tcp"
:
[
80
],
"udp"
:
[],
"count"
:
1
},
"network"
:
{
"name"
:
"Example, Inc."
,
"asn"
:
16509
,
"route"
:
null
,
"type"
:
null
},
"technology"
:
{
"cloud"
:
true
,
"cloud_providers"
:
[
"Example Services"
],
"cpes"
:
[],
"technologies"
:
[],
"technology_labels"
:
[]
},
"vulns"
:
{
"current_count"
:
0
,
"vulns"
:
[]
}
},
{
"tags"
:
[],
"id"
:
8620
,
"scoped_at"
:
"2022-09-30 06:51:57 +0000"
,
"detail_string"
:
"Fingerprint: Nginx | Title: 404 Not Found"
,
"enrichment_tasks"
:
[
"enrich/uri"
,
"sslcan"
],
"generated_at"
:
"2022-09-30T21:21:18Z"
}
Output messages
The Get ASM Entity Detailsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get ASM Entity Details". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get ASM Entity Detailsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Graph Details
Use the Get Graph Detailsaction to obtain detailed information about graphs in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Get Graph Detailsaction requires the following parameters:
Parameter | Description |
---|---|
Graph ID
|
Required. A comma-separated list of graph IDs to retrieve details. |
Max Links To Return
|
Required. The maximum number of links to return for each graph. The default value is |
Action outputs
The Get Graph Detailsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
Case wall table
The Get Graph Detailsaction can provide the following table for every enriched entity:
Table name: Graph GRAPH_ID Links
Table columns:
- Source
- Target
- Connection Type
JSON result
The following example shows the JSON result output received when using the Get Graph Detailsaction:
{
"data"
:
{
"attributes"
:
{
"comments_count"
:
0
,
"creation_date"
:
1603219837
,
"graph_data"
:
{
"description"
:
"Example LLC"
,
"version"
:
"api-5.0.0"
},
"last_modified_date"
:
1603219837
,
"links"
:
[
{
"connection_type"
:
"last_serving_ip_address"
,
"source"
:
"ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
,
"target"
:
"relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
},
{
"connection_type"
:
"last_serving_ip_address"
,
"source"
:
"relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
,
"target"
:
"203.0.113.3"
},
{
"connection_type"
:
"network_location"
,
"source"
:
"ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
,
"target"
:
"relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
},
{
"connection_type"
:
"network_location"
,
"source"
:
"relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
,
"target"
:
"203.0.113.3"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"203.0.113.3"
,
"target"
:
"relationships_communicating_files_20301133"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"4935cc8a4ff76d595e1bfab9fd2e6aa0f7c2fea941693f1ab4586eaba1528f47"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"c975794ff65c02b63fae1a94006a75294aac13277ca464e3ea7e40de5eda2b14"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"c7752154a2e894a4dec84833bee656357f4b84a9c7f601f586f79de667d8fe5c"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"692bb2ed1da43b0408c104b4ca4b4e97e15f3224e37dbea60214bcd991a2cfd3"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"74273ef55d8b7d23f7b058c7e47f3cbaf60c823a3e41ffb10e494917bad77381"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"f4f2f17c4df1b558cb80c8eab3edf5198970e9d87bd03943d4c2effafb696187"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"5edc8496869697aa229540bd6106b6679f6cfcbc6ee4837887183f470b49acb5"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"1582da57cb082d3f6835158133aafb5f3b8dcc880a813be135a0ff8099cf0ee8"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"be4ccb1ca71a987f481c22a1a43de491353945d815c89cbcc06233d993ac73cf"
},
{
"connection_type"
:
"communicating_files"
,
"source"
:
"relationships_communicating_files_20301133"
,
"target"
:
"60bb6467ee465f23a15f17cd73f7ecb9db9894c5a3186081a1c70fdc6e7607d6"
}
],
"nodes"
:
[
{
"entity_attributes"
:
{
"has_detections"
:
false
},
"entity_id"
:
"ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
,
"index"
:
0
,
"text"
:
""
,
"type"
:
"url"
,
"x"
:
51.22276722115952
,
"y"
:
65.7811310194184
},
{
"entity_attributes"
:
{},
"entity_id"
:
"relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
,
"index"
:
1
,
"text"
:
""
,
"type"
:
"relationship"
,
"x"
:
25.415664700492094
,
"y"
:
37.66636498768037
},
{
"entity_attributes"
:
{
"country"
:
"US"
},
"entity_id"
:
"203.0.113.3"
,
"fx"
:
-19.03611541222395
,
"fy"
:
24.958500220062717
,
"index"
:
2
,
"text"
:
""
,
"type"
:
"ip_address"
,
"x"
:
-19.03611541222395
,
"y"
:
24.958500220062717
},
{
"entity_attributes"
:
{},
"entity_id"
:
"relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"
,
"index"
:
3
,
"text"
:
""
,
"type"
:
"relationship"
,
"x"
:
14.37403861978968
,
"y"
:
56.85562691824892
},
{
"entity_attributes"
:
{},
"entity_id"
:
"relationships_communicating_files_20301133"
,
"index"
:
4
,
"text"
:
""
,
"type"
:
"relationship"
,
"x"
:
-51.78097726144755
,
"y"
:
10.087893225996158
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"peexe"
},
"entity_id"
:
"4935cc8a4ff76d595e1bfab9fd2e6aa0f7c2fea941693f1ab4586eaba1528f47"
,
"index"
:
5
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-79.11606194776019
,
"y"
:
-18.475026322309112
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"peexe"
},
"entity_id"
:
"c975794ff65c02b63fae1a94006a75294aac13277ca464e3ea7e40de5eda2b14"
,
"index"
:
6
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-64.80938048199627
,
"y"
:
46.75892061191275
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"android"
},
"entity_id"
:
"c7752154a2e894a4dec84833bee656357f4b84a9c7f601f586f79de667d8fe5c"
,
"index"
:
7
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-43.54064004476819
,
"y"
:
-28.547923020662786
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"android"
},
"entity_id"
:
"692bb2ed1da43b0408c104b4ca4b4e97e15f3224e37dbea60214bcd991a2cfd3"
,
"index"
:
8
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-15.529860440278318
,
"y"
:
-2.068209789825876
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"android"
},
"entity_id"
:
"74273ef55d8b7d23f7b058c7e47f3cbaf60c823a3e41ffb10e494917bad77381"
,
"index"
:
9
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-42.55971948293377
,
"y"
:
46.937155845680415
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"html"
},
"entity_id"
:
"f4f2f17c4df1b558cb80c8eab3edf5198970e9d87bd03943d4c2effafb696187"
,
"index"
:
10
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-62.447976875107706
,
"y"
:
-28.172418384729067
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"android"
},
"entity_id"
:
"5edc8496869697aa229540bd6106b6679f6cfcbc6ee4837887183f470b49acb5"
,
"index"
:
11
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-89.0326649183805
,
"y"
:
-2.2638551448322484
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"android"
},
"entity_id"
:
"1582da57cb082d3f6835158133aafb5f3b8dcc880a813be135a0ff8099cf0ee8"
,
"index"
:
12
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-26.35260716195174
,
"y"
:
-20.25669077264115
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"android"
},
"entity_id"
:
"be4ccb1ca71a987f481c22a1a43de491353945d815c89cbcc06233d993ac73cf"
,
"index"
:
13
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-82.1415994911387
,
"y"
:
34.89636762607467
},
{
"entity_attributes"
:
{
"has_detections"
:
true
,
"type_tag"
:
"android"
},
"entity_id"
:
" ENTITY_ID
"
,
"index"
:
14
,
"text"
:
""
,
"type"
:
"file"
,
"x"
:
-90.87738694680043
,
"y"
:
16.374462198116138
}
],
"private"
:
false
,
"views_count"
:
30
},
"id"
:
" ID
"
,
"links"
:
{
"self"
:
"https://www.virustotal.com/api/v3/graphs/ ID
"
},
"type"
:
"graph"
}
}
Output messages
The Get Graph Detailsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Graph Details". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Graph Detailsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Related IOCs
Use the Get Related IOCsaction to get information about IOCs related to entities using information from Google Threat Intelligence.
This action only supports the MD5, SHA-1, and SHA-256 hashes.
This action runs on the following Google SecOps entities:
-
IP address
-
URL
-
Hostname
-
Domain
-
Hash
-
Threat Actor
Action inputs
The Get Related IOCsaction requires the following parameters:
Parameter | Description |
---|---|
IOC Types
|
Required. A comma-separated list of IOCs to extract. The
possible values are as follows: |
Max IOCs To Return
|
Required. The maximum number of IOCs to return for selected IOC types for every entity. The default value is |
Action outputs
The Get Related IOCsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result. | Available |
JSON result
The following example shows the JSON result output received when using the Get Related IOCsaction:
{
"Entity"
:
" ENTITY
"
,
"EntityResult"
:
{
"hash"
:
[
" HASH
"
],
"url"
:
[
" URL
"
],
"domain"
:
[
" DOMAIN
"
],
"ip"
:
[
" IP_ADDRESS
"
]
}
}
Output messages
The Get Related IOCsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Related IOCs". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Related IOCsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Ping
Use the Pingaction to test the connectivity to Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
None.
Action outputs
The Pingaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result. | Available |
Output messages
The Pingaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Failed to connect to the Google Threat Intelligence server!
Error is ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Pingaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Search ASM Entities
Use the Search ASM Entitiesaction to search for ASM entities in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Search ASM Entitiesaction requires the following parameters:
Parameter | Description |
---|---|
Project Name
|
Optional. The name of the ASM project. If you don't set a
value, the action uses the value that you configured for the |
Entity Name
|
Optional. A comma-separated list of entity names to find entities. The action treats entity names that contain |
Minimum Vulnerabilities Count
|
Optional. The minimum number of vulnerabilities required for the action to return the entity. |
Minimum Issues Count
|
Optional. The minimum number of issues required for the action to return the entity. |
Tags
|
Optional. A comma-separated list of tag names to use when searching for entities. |
Max Entities To Return
|
Optional. The number of entities to return. The maximum
value is |
Critical or High Issue
|
Optional. If selected, the action only returns issues with Not selected by default. |
Action outputs
The Search ASM Entitiesaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Search ASM Entitiesaction:
{
"id"
:
" ID
"
,
"dynamic_id"
:
"Intrigue::Entity::IpAddress#192.0.2.92"
,
"alias_group"
:
"1935953"
,
"name"
:
"192.0.2.92"
,
"type"
:
"Intrigue::Entity::IpAddress"
,
"first_seen"
:
"2022-02-02T01:44:46Z"
,
"last_seen"
:
"2022-02-02T01:44:46Z"
,
"collection"
:
"cpndemorange_oum28bu"
,
"collection_type"
:
"Intrigue::Collections::UserCollection"
,
"collection_naics"
:
[],
"collection_uuid"
:
" COLLECTION_UUID
"
,
"organization_uuid"
:
" ORGANIZATION_UUID
"
,
"tags"
:
[],
"issues"
:
[],
"exfil_lookup_identifier"
:
null
,
"summary"
:
{
"scoped"
:
true
,
"issues"
:
{
"current_by_severity"
:
{},
"current_with_cve"
:
0
,
"all_time_by_severity"
:
{},
"current_count"
:
0
,
"all_time_count"
:
0
,
"critical_or_high"
:
false
},
"task_results"
:
[
"search_shodan"
],
"geolocation"
:
{
"city"
:
"San Jose"
,
"country_code"
:
"US"
,
"country_name"
:
null
,
"latitude"
:
"-121.8896"
,
"asn"
:
null
},
"ports"
:
{
"count"
:
0
,
"tcp"
:
null
,
"udp"
:
null
},
"resolutions"
:
[
"ec2-192-0-2-92.us-west-1.compute.example.com"
],
"network"
:
{
"name"
:
"EXAMPLE-02"
,
"asn"
:
"16509.0"
,
"route"
:
"2001:db8::/32"
,
"type"
:
null
},
"technology"
:
{
"cloud"
:
true
,
"cloud_providers"
:
[
"Cloud Provider Name"
]
}
}
}
Output messages
The Search ASM Entitiesaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Search ASM Entities". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Search ASM Entitiesaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Search ASM Issues
Use the Search ASM Issuesaction to search for ASM issues in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Search ASM Issuesaction requires the following parameters:
Project Name
Optional.
The name of the ASM project.
If you don't set a
value, the action uses the value that you configured for the ASM
Project Name
integration parameter.
Issue ID
Optional.
A comma-separated list of issue IDs to return the details.
Entity ID
Optional.
A comma-separated list of entity IDs to find related issues.
Entity Name
Optional.
A comma-separated list of entity names to find related issues.
The action treats entity names that contain /
forward slashes as invalid values.
Time Parameter
Optional.
A filter option to set the issue time.
The possible values are First Seen
and Last
Seen
.
The default value is First Seen
.
Time Frame
Optional.
A period to filter issues. If you select Custom
, configure the Start Time
parameter.
The possible values are as follows:
-
Last Hour
-
Last 6 Hours
-
Last 24 Hours
-
Last Week
-
Last Month
-
Custom
The default value is Last Hour
.
Start Time
Optional.
The start time for the results.
If you selected Custom
for the Time Frame
parameter, this parameter
is required.
Configure the value in the ISO 8601 format.
End Time
Optional.
The end time for the results.
If you selected Custom
for the Time Frame
parameter and didn't set
the end time, this parameter uses the current time as the end time.
Configure the value in the ISO 8601 format.
Lowest Severity To Return
Optional.
The lowest severity of the issues to return.
The possible values are as follows:
-
Select One
-
Critical
-
High
-
Medium
-
Low
-
Informational
The default value is Select One
.
If you select Select One
, this filter doesn't apply to the
search.
Status
Optional.
The status filter for the search.
The possible values are Open
, Closed
, and Select One
.
The default value is Select One
.
If you select Select One
, this filter doesn't apply to the
search.
Tags
Optional.
A comma-separated list of tag names to use when searching for issues.
Max Issues To Return
Required.
The number of issues to return.
The maximum
value is 200
. The default value is 50
.
Action outputs
The Search ASM Issuesaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Search ASM Issuesaction:
{
"id"
:
" ID
"
,
"uuid"
:
" UUID
"
,
"dynamic_id"
:
20073997
,
"name"
:
"exposed_ftp_service"
,
"upstream"
:
"intrigue"
,
"last_seen"
:
"2022-02-02T01:44:46.000Z"
,
"first_seen"
:
"2022-02-02T01:44:46.000Z"
,
"entity_uid"
:
"3443a638f951bdc23d3a089bff738cd961a387958c7f5e4975a26f12e544241f"
,
"entity_type"
:
"Intrigue::Entity::NetworkService"
,
"entity_name"
:
"192.0.2.204:24/tcp"
,
"alias_group"
:
"1937534"
,
"collection"
:
"example_oum28bu"
,
"collection_uuid"
:
"511311a6-6ff4-4933-8f5b-f1f7df2f6a3e"
,
"collection_type"
:
"user_collection"
,
"organization_uuid"
:
"21d2d125-d398-4bcb-bae1-11aee14adcaf"
,
"summary"
:
{
"pretty_name"
:
"Exposed FTP Service"
,
"severity"
:
3
,
"scoped"
:
true
,
"confidence"
:
"confirmed"
,
"status"
:
"open_new"
,
"category"
:
"misconfiguration"
,
"identifiers"
:
null
,
"status_new"
:
"open"
,
"status_new_detailed"
:
"new"
,
"ticket_list"
:
null
},
"tags"
:
[]
}
Output messages
The Search ASM Issuesaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Search ASM Issues". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Search ASM Issuesaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Search Entity Graphs
Use the Search Entity Graphsaction to search graphs that are based on Google SecOps entities in Google Threat Intelligence.
This action only supports the MD5, SHA-1, and SHA-256 hashes.
This action runs on the following Google SecOps entities:
-
Domain
-
File Hash
-
Hostname
-
IP Address
-
Threat Actor
-
URL
-
User
Action inputs
The Search Entity Graphsaction requires the following parameters:
Sort Field
Optional.
The field value to sort the results.
The possible values are as follows:
-
Owner
-
Creation Date
-
Last Modified Date
-
Views Count
-
Comments Count
The default value is Owner
.
Max Graphs To Return
Optional.
The maximum number of graphs to return for every action run.
The default value is 10
.
Action outputs
The Search Entity Graphsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Search Entity Graphsaction:
{
"data"
:
[
{
"attributes"
:
{
"graph_data"
:
{
"description"
:
"EXAMPLE"
,
"version"
:
"5.0.0"
}
},
"id"
:
" ID
"
}
]
}
Output messages
The Search Entity Graphsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Search Entity Graphs". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Search Graphs
Use the Search Graphsaction to search graphs based on custom filters in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Search Graphsaction requires the following parameters:
Query
Required.
The query filter for the graph.
For example, to search for graphs in the selected period, format the
query as follows: creation_date:2018-11-1+creation_date:2018-11-12
For more information about queries, see How to create queries , Graph-related modifiers , and Node-related modifiers .
Sort Field
Optional.
The field value to sort the VirusTotal graphs.
The possible values are as follows:
-
Comments Count
-
Creation Date
-
Last Modified Date
-
Owner
-
Views Count
The default value is Owner
.
Max Graphs To Return
Optional.
The maximum number of graphs to return for every action run.
The default value is 10
.
How to create queries
To refine search results from graphs, create queries that contain graph-related
modifiers
. To improve the search, you can combine
modifiers with AND
, OR
, and NOT
operators.
Date and numeric fields support the +
plus and -
minus suffixes. A plus
suffix matches values greater than the provided value. A minus suffix matches
values less than the provided value. Without a suffix, the query returns exact
matches.
To define ranges, you can use the same modifier multiple times in a query. For example, to search graphs that are created between 2018-11-15 and 2018-11-20, use the following query:
creation_date:2018-11-15+ creation_date:2018-11-20-
For dates or months that begin with 0
, remove the 0
character in the query.
For example, format the date of 2018-11-01 as 2018-11-1
.
Graph-related modifiers
The following table lists graph-related modifiers which you can use to construct the search query:
Modifier name | Description | Example |
---|---|---|
id
|
Filters by graph identifier. | id:g675a2fd4c8834e288af
|
name
|
Filters by graph name. | name:Example-name
|
owner
|
Filters by graphs owned by the user. | owner:example_user
|
group
|
Filters by graphs owned by a group. | group:example
|
visible_to_user
|
Filters by graphs visible to the user. | visible_to_user:example_user
|
visible_to_group
|
Filters by graphs visible to the group. | visible_to_group:example
|
private
|
Filters by private graphs. | private:true
, private:false
|
creation_date
|
Filters by the graph creation date. | creation_date:2018-11-15
|
last_modified_date
|
Filters by the latest graph modification date. | last_modified_date:2018-11-20
|
total_nodes
|
Filters by graphs that contain a specific number of nodes. | total_nodes:100
|
comments_count
|
Filters by the number of comments in the graph. | comments_count:10+
|
views_count
|
Filters by the number of graph views. | views_count:1000+
|
Node-related modifiers
The following table lists graph-related modifiers which you can use to construct the search query:
Modifier name | Description | Example |
---|---|---|
label
|
Filters by graphs that contain nodes with a specific label. | label:Kill switch
|
file
|
Filters by graphs that contain the specific file. | file:131f95c51cc819465fa17
|
domain
|
Filters by graphs that contain the specific domain. | domain:example.com
|
ip_address
|
Filters by graphs that contain the specific IP address. | ip_address:203.0.113.1
|
url
|
Filters by graphs that contain the specific URL. | url:https://example.com/example/
|
actor
|
Filters by graphs that contain the specific actor. | actor:example actor
|
victim
|
Filters by graphs that contain the specific victim. | victim:example_user
|
email
|
Filters by graphs that contain the specific email address. | email:user@example.com
|
department
|
Filters by graphs that contain the specific department. | department:engineers
|
Action outputs
The Search Graphsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Search Graphsaction:
{
"data"
:
[
{
"attributes"
:
{
"graph_data"
:
{
"description"
:
"EXAMPLE"
,
"version"
:
"5.0.0"
}
},
"id"
:
" ID
"
}
]
}
Output messages
The Search Graphsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Search Graphs". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Search Graphsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Submit File
Use the Submit Fileaction to submit a file and return results from Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
This action is asynchronous. Adjust the script timeout value in the Google SecOps integrated development environment (IDE) for the action as needed.
Action inputs
The Submit Fileaction requires the following parameters:
Parameter | Description |
---|---|
External URLs
|
Optional. A comma-separated list of public URLs for the files to submit. If both "External URL" and "File Paths" are provided, the action will collect files from both inputs. |
File Paths
|
Optional. A comma-separated list of absolute file paths. If you configure the **Linux Server Address** parameter, the action attempts to retrieve the file from a remote server. If both "External URL" and "File Paths" are provided, the action will collect files from both inputs. |
ZIP Password
|
Optional. A password for the zipped folder that contains the files to submit. |
Private Submission
|
Optional. If selected, the action submits the file in a private mode. To submit files privately, the VirusTotal Premium API is required. |
Check Hash
|
Optional. Default: Disabled. If enabled, action will first calculate the hashes for the files and search, if there is any available information for it. If available, it will return the information without the submission flow. |
Retrieve Comments
|
Optional. If selected, the action retrieves comments about the submitted file. |
Fetch MITRE Details
|
Optional. If selected, the action returns the information about the related MITRE techniques and tactics. Not selected by default. |
Lowest MITRE Technique Severity
|
Optional. The lowest MITRE technique severity to return. The action treats the This parameter only supports the Hash entity. The default value is |
Retrieve AI Summary
|
Optional. If selected, the action retrieves an AI summary for the submitted file. The AI summary is available for private submissions only. This parameter is experimental. Not selected by default. |
Max Comments To Return
|
Optional. The maximum number of comments to return in every action run. |
Linux Server Address
|
Optional. The IP address of the remote Linux server where the file is located. |
Linux Username
|
Optional. The username of the remote Linux server where the file is located. |
Linux Password
|
Optional. The password of the remote Linux server where the file is located. |
Action outputs
The Submit Fileaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result. | Available |
Case wall link
The Submit Fileaction can return the following link:
Report Link PATH
: URL
JSON result
The following example shows the JSON result output received when using the Submit Fileaction:
{
"data"
:
{
"attributes"
:
{
"categories"
:
{
"Dr.Web"
:
"known infection source/not recommended site"
,
"Forcepoint ThreatSeeker"
:
"compromised websites"
,
"sophos"
:
"malware repository, spyware and malware"
},
"first_submission_date"
:
1582300443
,
"html_meta"
:
{},
"last_analysis_date"
:
1599853405
,
"last_analysis_results"
:
{
"ADMINUSLabs"
:
{
"category"
:
"harmless"
,
"engine_name"
:
"ADMINUSLabs"
,
"method"
:
"blacklist"
,
"result"
:
"clean"
},
"AegisLab WebGuard"
:
{
"category"
:
"harmless"
,
"engine_name"
:
"AegisLab WebGuard"
,
"method"
:
"blacklist"
,
"result"
:
"clean"
},
},
"last_analysis_stats"
:
{
"harmless"
:
64
,
"malicious"
:
6
,
"suspicious"
:
1
,
"timeout"
:
0
,
"undetected"
:
8
},
"last_final_url"
:
"http://192.0.2.15/input/?mark=20200207-example.com/31mawe&tpl= ID
&engkey=bar+chart+click+event"
,
"last_http_response_code"
:
404
,
"last_http_response_content_length"
:
204
,
"last_http_response_content_sha256"
:
" HASH_VALUE
"
,
"last_http_response_headers"
:
{
"connection"
:
"keep-alive"
,
"content-length"
:
"204"
,
"content-type"
:
"text/html; charset=iso-8859-1"
,
"date"
:
"Fri, 11 Sep 2020 19:51:50 GMT"
,
"keep-alive"
:
"timeout=60"
,
"server"
:
"nginx"
},
"last_modification_date"
:
1599853921
,
"last_submission_date"
:
1599853405
,
"reputation"
:
0
,
"tags"
:
[
"ip"
],
"targeted_brand"
:
{},
"threat_names"
:
[
"Mal/HTMLGen-A"
],
"times_submitted"
:
3
,
"title"
:
"404 Not Found"
,
"total_votes"
:
{
"harmless"
:
0
,
"malicious"
:
0
},
"trackers"
:
{},
"url"
:
"http://192.0.2.15/input/?mark=20200207-example.com/31mawe&tpl= ID
&engkey=bar+chart+click+event"
},
"id"
:
" ID
"
,
"links"
:
{
"self"
:
"https://www.virustotal.com/api/v3/urls/ ID
"
},
"type"
:
"url"
,
"comments"
:
[
"text"
:
"attributes/text"
,
"date"
:
"attributes/date"
]
}
"is_risky"
:
true
,
"related_mitre_techniques"
:
[{
"id"
:
"T1071"
,
"name"
:
""
,
"severity"
:
""
}],
"related_mitre_tactics"
:
[{
"id"
:
"TA0011"
,
"name"
:
""
}],
"generated_ai_summary"
:
"summary_text_here…"
}
Output messages
The Submit Fileaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Submit File". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Error executing action "Submit File". Reason: ERROR_REASON
|
No "File Paths" or "External URLs" values At least one of "File Paths" or "External URLs" parameters should have a value. |
Script result
The following table lists the value for the script result output when using the Submit Fileaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Update ASM Issue
Use the Update ASM Issueaction to update an ASM issue in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Update ASM Issueaction requires the following parameters:
Issue ID
Required.
The ID of the issue to update.
Status
Required.
The new status to set for the issue.
The possible values are as follows:
-
Select One
-
New
-
Triaged
-
In Progress
-
Resolved
-
Duplicate
-
Out Of Scope
-
Not A Security Issue (Benign)
-
Risk Accepted
-
False Positive
-
Unable To Reproduce
-
Tracked Externally
-
Mitigated
The default value is Select One
. If you use the default
value, the action fails.
Action outputs
The Update ASM Issueaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Update ASM Issueaction:
{
"success"
:
true
,
"message"
:
"Successfully reported status as open_new"
,
"result"
:
"open_new"
}
Output messages
The Update ASM Issueaction can return the following output messages:
Output message | Message description |
---|---|
Successfully updated issue with ID
" ISSUE_ID
" in Google Threat
Intelligence.
|
The action succeeded. |
Error executing action "Update ASM Issue". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Update ASM Issueaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Update DTM Alert
Use the Update DTM Alertaction to update a Mandiant Digital Threat Monitoring alert in Google Threat Intelligence.
This action doesn't run on Google SecOps entities.
Action inputs
The Update DTM Alertaction requires the following parameters:
Alert ID
Required.
The ID of the alert to update.
Status
Optional.
The new status to set for the alert.
The possible values are as follows:
-
Select One
-
New
-
Read
-
Resolved
-
Escalated
-
In Progress
-
No Action Required
-
Duplicate
-
Not Relevant
-
Tracked Externally
The default value is Select One
. If you use the default
value, the action fails.
Action outputs
The Update DTM Alertaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Update DTM Alertaction:
{
"id"
:
" ID
"
,
"monitor_id"
:
" MONITOR_ID
"
,
"topic_matches"
:
[
{
"topic_id"
:
"4a6ffb0f-e90d-46ce-b10a-3a1e24fbe70d"
,
"value"
:
"ap-southeast-1.example.com"
,
"term"
:
"lwd"
,
"offsets"
:
[
26
,
29
]
},
{
"topic_id"
:
"doc_type:domain_discovery"
,
"value"
:
"domain_discovery"
}
],
"label_matches"
:
[],
"doc_matches"
:
[],
"tags"
:
[],
"created_at"
:
"2024-05-31T12:27:43.475Z"
,
"updated_at"
:
"2024-05-31T12:43:20.399Z"
,
"labels_url"
:
"https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ ID
/labels"
,
"topics_url"
:
"https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ ID
/topics"
,
"doc_url"
:
"https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ ID
"
,
"status"
:
"closed"
,
"alert_type"
:
"Domain Discovery"
,
"alert_summary"
:
"See alert content for details"
,
"title"
:
"Suspicious domain \"ap-southeast-1.example.com\" similar to \"lwd\""
,
"email_sent_at"
:
""
,
"severity"
:
"medium"
,
"confidence"
:
0.5
,
"has_analysis"
:
false
,
"monitor_version"
:
2
}
Output messages
The Update DTM Alertaction can return the following output messages:
Output message | Message description |
---|---|
Successfully updated alert with ID INCIDENT_ID
in Google Threat
Monitoring.
|
Action succeeded. |
Error executing action "Update DTM Alert". Reason: ERROR_REASON
|
Action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Update DTM Alertaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Connectors
For more detail about how to configure connectors in Google SecOps, see Ingest your data (connectors) .
Google Threat Intelligence - DTM Alerts Connector
Use the Google Threat Intelligence - DTM Alerts Connectorto retrieve alerts
from Google Threat Intelligence. To work with a dynamic list, use the alert_type
parameter.
Connector inputs
The Google Threat Intelligence - DTM Alerts Connectorrequires the following parameters:
Product Field Name
Required.
The name of the field where the product name is stored.
The default value is Product Name
.
The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.
Event Field Name
Required.
The name of the field that determines the event name (subtype).
The default value is event_type
.
Environment Field Name
Optional.
The name of the field where the environment name is stored.
If the environment field is missing, the connector uses the default value.
The default value is ""
.
Environment Regex Pattern
Optional.
A regular expression pattern to run on the value found in the Environment Field Name
field. This parameter lets you manipulate
the environment field using the regular expression logic.
Use the default value .*
to retrieve the required raw Environment Field Name
value.
If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.
Script Timeout
Required.
The timeout limit, in seconds, for the Python process that runs the current script.
The default value is 180
.
API Root
Required.
The API root of the Google Threat Intelligence instance.
The default value is https://www.virustotal.com
.
API Key
Required.
The Google Threat Intelligence API key.
Lowest Severity To Fetch
Optional.
The lowest severity of the alerts to retrieve.
If you don't configure this parameter, the connector ingests alerts with all severity levels.
The possible values are as follows:
-
Low
-
Medium
-
High
Monitor ID Filter
Optional.
A comma-separated list of monitor IDs to retrieve the alerts.
Disable Overflow
Optional.
If selected, the connector ignores the Google SecOps overflow mechanism.
Selected by default.
Max Hours Backwards
Required.
The number of hours prior to now to retrieve alerts.
This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp.
The default value is 1
.
Max Alerts To Fetch
Required.
The number of alerts to process in every connector iteration.
The maximum value is 25
. The default value is 25
.
Use dynamic list as a blocklist
Required.
If selected, the connector uses the dynamic list as a blocklist.
Not selected by default.
Verify SSL
Required.
If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server.
Selected by default.
Proxy Server Address
Optional.
The address of the proxy server to use.
Proxy Username
Optional.
The proxy username to authenticate with.
Proxy Password
Optional.
The proxy password to authenticate with.
Connector rules
The Google Threat Intelligence - DTM Alerts Connectorsupports proxies.
Connector events
There are two types of events for the Google Threat Intelligence - DTM Alerts Connector: an event that is based on the main alert and an event that is based on a topic.
An example of the connector event based on the main alert is as follows:
{
"id"
:
" ID
"
,
"event_type"
:
"Main Alert"
,
"monitor_id"
:
" MONITOR_ID
"
,
"doc"
:
{
"__id"
:
"6ed37932-b74e-4253-aa69-3eb4b00d0ea2"
,
"__type"
:
"account_discovery"
,
"ingested"
:
"2024-05-20T16:15:53Z"
,
"service_account"
:
{
"login"
:
"user@example.com"
,
"password"
:
{
"plain_text"
:
"********"
},
"profile"
:
{
"contact"
:
{
"email"
:
"user@example.com"
,
"email_domain"
:
"example.com"
}
},
"service"
:
{
"inet_location"
:
{
"domain"
:
"www.example-service.com"
,
"path"
:
"/signin/app"
,
"protocol"
:
"https"
,
"url"
:
"https://www.example-service.com/signin/app"
},
"name"
:
"www.example-service.com"
}
},
"source"
:
"ccmp"
,
"source_file"
:
{
"filename"
:
"urlloginpass ap.txt"
,
"hashes"
:
{
"md5"
:
"c401baa01fbe311753b26334b559d945"
,
"sha1"
:
"bf700f18b6ab562afb6128b42a34ae088f9c7434"
,
"sha256"
:
"5e6302d95a7e7edb28d68926cede0c44babded720ad1cc9a72c12d8c6d66153f"
},
"size"
:
84161521407
},
"source_url"
:
"https://example.com"
,
"timestamp"
:
"2023-11-14T20:09:04Z"
},
"labels"
:
"Label"
,
"topic_matches"
:
[
{
"topic_id"
:
"doc_type:account_discovery"
,
"value"
:
"account_discovery"
}
],
"label_matches"
:
[],
"doc_matches"
:
[
{
"match_path"
:
"service_account.profile.contact.email_domain"
,
"locations"
:
[
{
"offsets"
:
[
0
,
9
],
"value"
:
"example.com"
}
]
}
],
"tags"
:
[],
"created_at"
:
"2024-05-20T16:16:52.439Z"
,
"updated_at"
:
"2024-05-30T12:10:56.691Z"
,
"labels_url"
:
"https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ ID
/labels"
,
"topics_url"
:
"https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ ID
/topics"
,
"doc_url"
:
"https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ ID
"
,
"status"
:
"read"
,
"alert_type"
:
"Compromised Credentials"
,
"alert_summary"
:
"ccmp"
,
"title"
:
"Leaked Credentials found for domain \"example.com\""
,
"email_sent_at"
:
""
,
"indicator_mscore"
:
60
,
"severity"
:
"high"
,
"confidence"
:
0.9999995147741939
,
"aggregated_under_id"
:
" ID
"
,
"monitor_name"
:
"Compromised Credentials - Example"
,
"has_analysis"
:
false
,
"meets_password_policy"
:
"policy_unset"
,
"monitor_version"
:
1
}
An example of the connector event based on a topic is as follows:
{
"id"
:
" ID
"
,
"event_type"
:
"location_name"
,
"location_name"
:
" LOCATION_NAME
"
,
"timestamp"
:
"2024-05-25T10:56:17.201Z"
,
"type"
:
"location_name"
,
"value"
:
" LOCATION_NAME
"
,
"extractor"
:
"analysis-pipeline.nerprocessor-nerenglish-gpu"
,
"extractor_version"
:
"4-0-2"
,
"confidence"
:
100
,
"entity_locations"
:
[
{
"element_path"
:
"body"
,
"offsets"
:
[
227
,
229
]
}
]
}
Google Threat Intelligence - ASM Issues Connector
Use the Google Threat Intelligence - ASM Issues Connectorto retrieve
information about the ASM issues from Google Threat Intelligence. To
work with the dynamic list filter, use the category
parameter.
Connector inputs
The Google Threat Intelligence - ASM Issues Connectorrequires the following parameters:
Product Field Name
Required.
The name of the field where the product name is stored.
The default value is Product Name
.
The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.
Event Field Name
Required.
The name of the field that determines the event name (subtype).
The default value is entity_type
.
Environment Field Name
Optional.
The name of the field where the environment name is stored.
If the environment field is missing, the connector uses the default value.
The default value is ""
.
Environment Regex Pattern
Optional.
A regular expression pattern to run on the value found in the Environment Field Name
field. This parameter lets you manipulate
the environment field using the regular expression logic.
Use the default value .*
to retrieve the required raw Environment Field Name
value.
If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.
Script Timeout
Required.
The timeout limit, in seconds, for the Python process that runs the current script.
The default value is 180
.
API Root
Required.
The API root of the Google Threat Intelligence instance.
The default value is https://www.virustotal.com
.
API Key
Required.
The Google Threat Intelligence API key.
Project Name
Optional.
The name of the ASM project.
If you don't set a value, only alerts from collections in the primary project are returned.
Lowest Severity To Fetch
Optional.
The lowest severity of the alerts to retrieve.
If you don't configure this parameter, the connector ingests alerts with all severity levels.
The possible values are as follows:
-
Critical
-
High
-
Medium
-
Low
-
Informational
Max Hours Backwards
Required.
The number of hours prior to now to retrieve alerts.
This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp.
The default value is 1
.
Max Issues To Fetch
Required.
The number of issues to process in every connector iteration.
The maximum value is 100
. The default value is 10
.
Disable Overflow
Optional.
If selected, the connector ignores the Google SecOps overflow mechanism.
Selected by default.
Use dynamic list as a blocklist
Required.
If selected, the connector uses the dynamic list as a blocklist.
Not selected by default.
Verify SSL
Required.
If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server.
Selected by default.
Proxy Server Address
Optional.
The address of the proxy server to use.
Proxy Username
Optional.
The proxy username to authenticate with.
Proxy Password
Optional.
The proxy password to authenticate with.
Connector events
The example of the Google Threat Intelligence - ASM Issues Connectorevent is as follows:
{
"uuid"
:
" UUID
"
,
"dynamic_id"
:
25590288
,
"entity_uid"
:
"9bae9d6f931c5405ad95f0a51954cf8f7193664f0808aadc41c8b25e08eb9bc3"
,
"alias_group"
:
null
,
"category"
:
"vulnerability"
,
"confidence"
:
"confirmed"
,
"description"
:
"A crafted request uri-path can cause mod_proxy to forward the request to an origin server chosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier."
,
"details"
:
{
"added"
:
"2021-10-15"
,
"proof"
:
"The following resolver IP Address: 203.0.113.132:50408 invoked a DNS Lookup with the following data <empty> at 2023-02-03T03:41:48Z using the UUID associated with this entity."
,
"status"
:
"confirmed"
,
"severity"
:
1
,
"references"
:
[
{
"uri"
:
"https://example.com/vuln/detail/CVE-2021-40438"
,
"type"
:
"description"
},
{
"uri"
:
"https://httpd.example.org/security/vulnerabilities_24.html"
,
"type"
:
"description"
},
{
"uri"
:
"https://example.com/cve-2021-40438"
,
"type"
:
"description"
}
],
"remediation"
:
null
},
"first_seen"
:
"2022-11-28T03:24:48.000Z"
,
"identifiers"
:
[
{
"name"
:
"CVE-2021-40438"
,
"type"
:
"CVE"
}
],
"last_seen"
:
"2023-02-03T03:41:48.000Z"
,
"name"
:
"cve_2021_40438"
,
"pretty_name"
:
"Apache HTTP Server Side Request Forgery (CVE-2021-40438)"
,
"scoped"
:
true
,
"severity"
:
1
,
"source"
:
null
,
"status"
:
"open_in_progress"
,
"ticket_list"
:
null
,
"type"
:
"standard"
,
"uid"
:
" UID
"
,
"upstream"
:
"intrigue"
,
"created_at"
:
"2022-11-28T03:34:31.124Z"
,
"updated_at"
:
"2023-02-03T04:03:44.126Z"
,
"entity_id"
:
298912419
,
"collection_id"
:
117139
,
"collection"
:
"example_oum28bu"
,
"collection_type"
:
"user_collection"
,
"collection_uuid"
:
"511311a6-6ff4-4933-8f5b-f1f7df2f6a3e"
,
"organization_uuid"
:
"21d2d125-d398-4bcb-bae1-11aee14adcaf"
,
"entity_name"
:
"http://192.0.2.73:80"
,
"entity_type"
:
"Intrigue::Entity::Uri"
,
"Intrigue::Entity::Uri"
:
"http://192.0.2.73:80"
,
"summary"
:
{
"pretty_name"
:
"Apache HTTP Server Side Request Forgery (CVE-2021-40438)"
,
"severity"
:
1
,
"scoped"
:
true
,
"confidence"
:
"confirmed"
,
"status"
:
"open_in_progress"
,
"category"
:
"vulnerability"
,
"identifiers"
:
[
{
"name"
:
"CVE-2021-40438"
,
"type"
:
"CVE"
"CVE"
:
"CVE-2021-40438"
}
],
"status_new"
:
"open"
,
"status_new_detailed"
:
"in_progress"
,
"ticket_list"
:
null
},
"tags"
:
[]
}
Google Threat Intelligence - Livehunt Connector
Use the Google Threat Intelligence - Livehunt Connectorto retrieve
information about the Livehunt notifications and their related files from
Google Threat Intelligence. To work with the dynamic list, use the rule_name
parameter.
Connector inputs
The Google Threat Intelligence - Livehunt Connectorrequires the following parameters:
Parameter | Description |
---|---|
Product Field Name
|
Required. The name of the field where the product name is stored. The default value is The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default. |
Event Field Name
|
Required. The name of the field that determines the event name (subtype). The default value is |
Environment Field Name
|
Optional. The name of the field where the environment name is stored. If the environment field is missing, the connector uses the default value. The default value is |
Environment Regex Pattern
|
Optional. A regular expression pattern to run on the value found in the Use the default value If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment. |
Script Timeout
|
Required. The timeout limit, in seconds, for the Python process that runs the current script. The default value is |
API Root
|
Required. The API root of the Google Threat Intelligence instance. The default value is |
API Key
|
Required. The Google Threat Intelligence API key. |
Max Hours Backwards
|
Required. The number of hours prior to now to retrieve alerts. This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp. The default value is |
Max Notifications To Fetch
|
Required. The number of notifications to process in every connector iteration. The default value is |
Disable Overflow
|
Optional. If selected, the connector ignores the Google SecOps overflow mechanism. Selected by default. |
Use dynamic list as a blocklist
|
Required. If selected, the connector uses the dynamic list as a blocklist. Not selected by default. |
Verify SSL
|
Required. If selected, the integration validates the SSL certificate when connecting to the Google Threat Intelligence server. Selected by default. |
Proxy Server Address
|
Optional. The address of the proxy server to use. |
Proxy Username
|
Optional. The proxy username to authenticate with. |
Proxy Password
|
Optional. The proxy password to authenticate with. |
Connector rules
The Google Threat Intelligence - Livehunt Connectorsupports proxies.
Connector events
The example of the Google Threat Intelligence - Livehunt Connectorevent is as follows:
{
"attributes"
:
{
"type_description"
:
"Win32 DLL"
,
"tlsh"
:
"T1E6A25B41AF6020B3EAF508F135F6D913A930B7110AA4C957774B86511FB4BC3BE7AA2D"
,
"vhash"
:
"124056651d15155bzevz36z1"
,
< !
CONTENT
OMITTED
—
>
"last_analysis_date"
:
1645620534
,
"unique_sources"
:
8
,
"first_submission_date"
:
1562871116
,
"sha1"
:
"3de080d32b14a88a5e411a52d7b43ff261b2bf5e"
,
"ssdeep"
:
"384:wBvtsqUFEjxcAfJ55oTiwO5xOJuqn2F9BITqGBRnYPLxDG4y8jm+:e1YOcAfGnOmJuqn2LBITqGfWDG4yR+"
,
"md5"
:
"6a796088cd3d1b1d6590364b9372959d"
,
"magic"
:
"PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit"
,
"last_analysis_stats"
:
{
"harmless"
:
0
,
"type-unsupported"
:
5
,
"suspicious"
:
0
,
"confirmed-timeout"
:
0
,
"timeout"
:
14
,
"failure"
:
4
,
"malicious"
:
0
,
"undetected"
:
49
},
"reputation"
:
0
,
"first_seen_itw_date"
:
1536433291
},
"type"
:
"file"
,
"id"
:
" ID
"
,
"links"
:
{
"self"
:
"https://www.virustotal.com/api/v3/files/ ID
"
},
"context_attributes"
:
{
"notification_id"
:
"6425310189355008-7339e39660589ca2ec996c1c15ca5989- ID
-1645620534"
,
"notification_source_key"
:
" KEY
"
,
"notification_tags"
:
[
"cve_pattern"
,
" ID
"
,
"cverules"
],
"ruleset_name"
:
"cverules"
,
"notification_source_country"
:
"KR"
,
"rule_name"
:
"cve_pattern"
,
"notification_snippet"
:
""
,
"ruleset_id"
:
"6425310189355008"
,
"rule_tags"
:
[],
"notification_date"
:
1645620832
,
"match_in_subfile"
:
false
}
}
Need more help? Get answers from Community members and Google SecOps professionals.