Integrate Google Threat Intelligence withGoogle SecOps

Integration version: 1.0

This document explains how to integrate Google Threat Intelligencewith Google Security Operations.

Before you begin

To use the integration, you need an API key. For more information, seeGoogle Threat Intelligence API keys

Integration parameters

The Google Threat Intelligence integration requires the followingparameters:

ParameterDescription
API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value ishttps://www.virustotal.com.

API Key

Required.

The Google Threat Intelligence API key.

ASM Project Name

Optional.

The Mandiant Attack Surface Management (ASM) project name to use in the integration. This parameter is required to run theSearch ASM Entities,Search ASM Issues and Update ASM Issue actions.

If no value is set, only alerts from collections in the primary project are returned.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting tothe Google Threat Intelligence server.

Selected by default.

For instructions about how to configure an integration inGoogle SecOps, seeConfigureintegrations.

You can make changes at a later stage, if needed. After you configure anintegration instance, you can use it in playbooks. For more information abouthow to configure and support multiple instances, seeSupportingmultiple instances.

Actions

For more information about actions, seeRespond to pending actions from Your Workdesk andPerform amanual action.

Add ASM Issue Note

Use theAdd ASM Issue Note action to append a technical note to an AttackSurface Management (ASM) issue in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheAdd ASM Issue Note action requires the following parameters:

ParameterDescription
Alert ID

Required.

The ID of the alert to update.

Text

Required.

The content of the analysis or note to append to the alert.

Action outputs

TheAdd ASM Issue Note action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultNot available
Output messagesAvailable
Script resultAvailable
Output messages

TheAdd ASM Issue Note action can return the following output messages:

Output messageMessage description

Successfully updated the alert with the IDALERT_ID in Google Threat Intelligence.

The action succeeded.
Error executing action "Add ASM Issue Note". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheAdd ASM Issue Note action:

Script result nameValue
is_successtrue orfalse

Add Comment To Entity

Use theAdd Comment To Entity action to add comments toGoogle SecOps entities in Google Threat Intelligence.

This action only supports MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • File Hash
  • Hostname
  • IP Address
  • URL

Action inputs

TheAdd Comment To Entity action requires the following parameters:

ParameterDescription
Comment

Required.

A comment to add to all supported entities.

Action outputs

TheAdd Comment To Entity action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result outputs received when using theAdd Comment To Entity action:

{"Status":"Done"}
{"Status":"Not done"}
Output messages

TheAdd Comment To Entity action can return the following output messages:

Output messageMessage description

Successfully added comments to the following entities in Google Threat Intelligence:ENTITY_ID.

The action wasn't able to add comments to the following entities in Google Threat Intelligence:ENTITY_ID.

No comments were added to the provided entities in Google Threat Intelligence.

The action succeeded.
Error executing action "Add Comment To Entity". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheAdd Comment To Entity action:

Script result nameValue
is_successTrue orFalse

Add Tag To DTM Alert

Use theAdd Tag To DTM Alert to add tags to a Digital Threat Monitoring(DTM) alert in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheAdd Tag To DTM Alert action requires the following parameters:

ParameterDescription
Alert ID

Required.

The unique identifier of the alert to update.

Mode

Optional.

The operational logic for the tag update.

The possible values are as follows:

  • Append: Adds the specified tags to the alert's existing tag list.
  • Set: Overwrites all existing alert tags with the tags provided inTags.

The default value isAppend.

Tags

Required.

A comma-separated list of tags to apply to the alert.

Action outputs

TheAdd Tag To DTM Alert action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultNot available
Output messagesAvailable
Script resultAvailable
Output messages

TheAdd Tag To DTM Alert action can return the following output messages:

Output messageMessage description

Successfully updated the alert with the IDALERT_ID in Google Threat Intelligence.

The action succeeded.
Error executing action "Add Tag To DTM Alert". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheAdd Tag To DTM Alert action:

Script result nameValue
is_successtrue orfalse

Add Vote To Entity

Use theAdd Comment To Entity action to add votes toGoogle SecOps entities in Google Threat Intelligence.

This action only supports MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • File Hash
  • Hostname
  • IP Address
  • URL

Action inputs

TheAdd Vote To Entity action requires the following parameters:

ParameterDescription
Vote

Required.

A vote to add to all supported entities.

The possible values are as follows:

  • Harmless
  • Malicious

The default value isMalicious.

Action outputs

TheAdd Vote To Entity action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theAdd Vote To Entity action:

{"Status":"Done"}
{"Status":"Not done"}
Output messages

TheAdd Vote To Entity action can return the following output messages:

Output messageMessage description

Successfully added votes to the following entities in Google Threat Intelligence:ENTITY_ID.

Action wasn't able to add votess to the following entities in Google Threat Intelligence:ENTITY_ID.

No votes were added to the provided entities in Google Threat Intelligence.

The action succeeded.
Error executing action "Add Vote To Entity". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheAdd Vote To Entity action:

Script result nameValue
is_successTrue orFalse

Download File

Use theDownload File action to download a file fromGoogle Threat Intelligence.

This action runs on the Google SecOpsHash entity.

This action only supports MD5, SHA-1, and SHA-256 hashes.

Action inputs

TheDownload File action requires the following parameters:

ParameterDescription
Download Folder Path

Required.

The path to the folder to store downloaded files.

Overwrite

Required.

If selected, the action overwrites an existing file with the new file if the filenames are identical.

Selected by default.

Action outputs

TheDownload File action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theDownload File action:

{"absolute_file_paths":["file_path_1","file_path_2"]}
Output messages

TheDownload File action can return the following output messages:

Output messageMessage description

Successfully downloaded related files for the following entities in Google Threat Intelligence:ENTITY_ID.

No related files were found for the following entities in Google Threat Intelligence:ENTITY_ID.

No related files were found for the provided entities in Google Threat Intelligence.

The action succeeded.
Error executing action "Download File". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Enrich Entities

Use theEnrich Entities action to enrich entities with information fromGoogle Threat Intelligence.

This action supports the MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • Hash
  • Hostname
  • IP Address
  • URL
  • CVE
  • Threat Actor

Action inputs

TheEnrich Entities action requires the following parameters:

ParameterDescription
GTI Score

Optional.

The minimum Google Threat Intelligence score required to mark a Google SecOps entity as suspicious. This condition is validated alongside Google Threat Intelligence verdict information.

This parameter only supportsIP Address,URL,Hostname,Domain, andHash entities.

If no value is provided, the action ignores Google Threat Intelligence score values.

The default value is60.

Engine Threshold

Optional.

The minimum number of security engines that must mark an entity as malicious or suspicious for Google SecOps to label it as suspicious. This condition is validated alongside Google Threat Intelligence verdict information.

This parameter only supportsIP Address,URL,Hostname,Domain, andHash entities.

IfEngine Allowlist contains values, the action only counts results from those specific engines.

If no value is provided, the action ignores engine calculations.

Engine Percentage Threshold

Optional.

The minimum percentage of security engines that must mark an entity as malicious or suspicious for Google SecOps to label it as suspicious.

This parameter only supportsIP Address,URL,Hostname,Domain, andHash entities.

IfEngine Allowlist contains values, the action only calculates the percentage from those specific engines.

If bothEngine Threshold andEngine Percentage Threshold are provided,Engine Threshold takes precedence.

If no value is provided, the action ignores engine calculations.

The maximum value is100.

The minimum value is0.

Engine Allowlist

Optional.

A comma-separated list of security engines used to retrieve maliciousness information (for example,AlienVault,Kaspersky).

If no value is provided, the action retrieves results from every available engine.

Engines that don't return information about an entity are excluded fromEngine Threshold andEngine Percentage Threshold calculations.

Resubmit Entity

Optional.

If selected, the action resubmits entities for analysis instead of using the entity information from the previous action run.

This parameter only supports theURL andHash entities.

Not selected by default.

Resubmit After (Days)

Optional.

The number of days for the action to wait before submitting the entity again. To use this parameter, select theResubmit Entity parameter.

The default value is30.

This parameter only supports theURL andHash entities.

Sandbox

Optional.

A comma-separated list of sandbox names to analyze, such asVirusTotal Jujubox, VirusTotal ZenBox, Microsoft Sysinternals, Tencent HABO.

This parameter only supports theHash entity.

If you don't set this parameter, the action uses the default sandbox, which isVirusTotal Jujubox.

Retrieve Sandbox Analysis

Optional.

If selected, the action retrieves the sandbox analysis for the entity and creates a separate section for every sandbox in the JSON result.

The action returns data for sandboxes that you configured in theSandbox parameter.

This parameter only supports theHash entity.

Not selected by default.

Fetch MITRE Details

Optional.

If selected, the action returns information about the related MITRE techniques and tactics.

This parameter only supports theHash entity.

Not selected by default.

Lowest MITRE Technique Severity

Optional.

The lowest MITRE technique severity to return.

The action treats theUnknown severity asInfo.

This parameter only supports theHash entity.

The possible values are as follows:

  • High
  • Medium
  • Low
  • Info

The default value isMedium.

Retrieve Comments

Optional.

If selected, the action retrieves comments about the entity.

This parameter supports the following entities:

  • Domain
  • Hash
  • Hostname
  • IP Address
  • URL
Max Comments To Return

Optional.

The maximum number of comments to return for every action run.

The default value is10.

Action outputs

TheEnrich Entities action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkAvailable
Case wall tableNot available
Entity enrichment tableAvailable
JSON resultAvailable
Output messagesAvailable
Script result.Available
Case wall link

TheEnrich Entities action can return the following links:

  • IOC:https://www.virustotal.com/gui/ENTITY_TYPE/ENTITY/detection

  • Threat actor:https://www.virustotal.com/gui/collection/threat-actor--ID

  • Vulnerability:https://www.virustotal.com/gui/collection/vulnerability--ID

Entity enrichment table
  1. TheEnrich Entities action support the following entity enrichment forIP addresses:
  2. Enrichment fieldSource (JSON key)Applicability
    GTI_ididWhen available in the JSON result.
    GTI_owneras_ownerWhen available in the JSON result.
    GTI_asnasnWhen available in the JSON result.
    GTI_continentcontinentWhen available in the JSON result.
    GTI_countrycountryWhen available in the JSON result.
    GTI_harmless_countlast_analysis_stats/harmlessWhen available in the JSON result.
    GTI_malicious_countlast_analysis_stats/maliciousWhen available in the JSON result.
    GTI_suspicious_countlast_analysis_stats/suspiciousWhen available in the JSON result.
    GTI_undetected_countlast_analysis_stats/undetectedWhen available in the JSON result.
    GTI_certificate_valid_not_aftervalidity/not_afterWhen available in the JSON result.
    GTI_certificate_valid_not_beforevalidity/not_beforeWhen available in the JSON result.
    GTI_reputationreputationWhen available in the JSON result.
    GTI_tagsComma-separated list of tagsWhen available in the JSON result.
    GTI_malicious_vote_counttotal_votes/maliciousWhen available in the JSON result.
    GTI_harmless_vote_counttotal_votes/harmlessWhen available in the JSON result.
    GTI_report_linkreport_linkWhen available in the JSON result.
    GTI_widget_linkwidget_urlWhen available in the JSON result.
    GTI_threat_scoregti_assessment.threat_score.valueWhen available in the JSON result.
    GTI_severitygti_assessment.severity.valueWhen available in the JSON result.
    GTI_normalised_categoriesCSV of gti_assessment.contributing_factors.normalised_categoriesWhen available in the JSON result.
    GTI_verdictgti_assessment.verdict.valueWhen available in the JSON result.
    GTI_descriptiongti_assessment.descriptionWhen available in the JSON result.
  3. TheEnrich Entities action support the following entity enrichment forURL:
  4. Enrichment fieldSource (JSON key)Applicability
    GTI_ididWhen available in the JSON result.
    GTI_titletitleWhen available in the JSON result.
    GTI_last_http_response_codelast_http_response_codeWhen available in the JSON result.
    GTI_last_http_response_content_lengthlast_http_response_content_lengthWhen available in the JSON result.
    GTI_threat_namesComma-separated list of threat_namesWhen available in the JSON result.
    GTI_harmless_countlast_analysis_stats/harmlessWhen available in the JSON result.
    GTI_malicious_countlast_analysis_stats/maliciousWhen available in the JSON result.
    GTI_suspicious_countlast_analysis_stats/suspiciousWhen available in the JSON result.
    GTI_undetected_countlast_analysis_stats/undetectedWhen available in the JSON result.
    GTI_reputationreputationWhen available in the JSON result.
    GTI_tagsComma-separated list of tagsWhen available in the JSON result.
    GTI_malicious_vote_counttotal_votes/maliciousWhen available in the JSON result.
    GTI_harmless_vote_counttotal_votes/harmlessWhen available in the JSON result.
    GTI_report_linkreport_linkWhen available in the JSON result.
    GTI_widget_linkwidget_urlWhen available in the JSON result.
    GTI_threat_scoregti_assessment.threat_score.valueWhen available in the JSON result.
    GTI_severitygti_assessment.severity.valueWhen available in the JSON result.
    GTI_normalised_categoriesCSV of gti_assessment.contributing_factors.normalised_categoriesWhen available in the JSON result.
    GTI_verdictgti_assessment.verdict.valueWhen available in the JSON result.
    GTI_descriptiongti_assessment.descriptionWhen available in the JSON result.
    GTI_category_{attributes/categories/json key}{attributes/categories/json key value}When available in the JSON result.
  5. TheEnrich Entities action support the following entity enrichment forHash:
  6. Enrichment fieldSource (JSON key)Applicability
    GTI_ididWhen available in the JSON result.
    GTI_magicmagicWhen available in the JSON result.
    GTI_md5md5When available in the JSON result.
    GTI_sha1sha1When available in the JSON result.
    GTI_sha256sha256When available in the JSON result.
    GTI_ssdeepssdeepWhen available in the JSON result.
    GTI_tlshtlshWhen available in the JSON result.
    GTI_vhashvhashWhen available in the JSON result.
    GTI_meaningful_namemeaningful_nameWhen available in the JSON result.
    GTI_magicComma-separated list of namesWhen available in the JSON result.
    GTI_harmless_countlast_analysis_stats/harmlessWhen available in the JSON result.
    GTI_malicious_countlast_analysis_stats/maliciousWhen available in the JSON result.
    GTI_suspicious_countlast_analysis_stats/suspiciousWhen available in the JSON result.
    GTI_undetected_countlast_analysis_stats/undetectedWhen available in the JSON result.
    GTI_reputationreputationWhen available in the JSON result.
    GTI_tagsComma-separated list of tagsWhen available in the JSON result.
    GTI_malicious_vote_counttotal_votes/maliciousWhen available in the JSON result.
    GTI_harmless_vote_counttotal_votes/harmlessWhen available in the JSON result.
    GTI_report_linkreport_linkWhen available in the JSON result.
    GTI_widget_linkwidget_urlWhen available in the JSON result.
    GTI_threat_scoregti_assessment.threat_score.valueWhen available in the JSON result.
    GTI_severitygti_assessment.severity.valueWhen available in the JSON result.
    GTI_normalized_categoriesCSV of gti_assessment.contributing_factors.normalised_categoriesWhen available in the JSON result.
    GTI_verdictgti_assessment.verdict.valueWhen available in the JSON result.
    GTI_descriptiongti_assessment.descriptionWhen available in the JSON result.
    GTI_exiftool_{json_key}GTI_exiftool_{json_key.value}
  7. TheEnrich Entities action support the following entity enrichment forDomain/Hostname:
  8. Enrichment fieldSource (JSON key)Applicability
    GTI_ididWhen available in the JSON result.
    GTI_harmless_countlast_analysis_stats/harmlessWhen available in the JSON result.
    GTI_malicious_countlast_analysis_stats/maliciousWhen available in the JSON result.
    GTI_suspicious_countlast_analysis_stats/suspiciousWhen available in the JSON result.
    GTI_undetected_countlast_analysis_stats/undetectedWhen available in the JSON result.
    GTI_reputationreputationWhen available in the JSON result.
    GTI_tagsComma-separated list of tagsWhen available in the JSON result.
    GTI_malicious_vote_counttotal_votes/maliciousWhen available in the JSON result.
    GTI_harmless_vote_counttotal_votes/harmlessWhen available in the JSON result.
    GTI_report_linkreport_linkWhen available in the JSON result.
    GTI_widget_linkwidget_urlWhen available in the JSON result.
    GTI_threat_scoregti_assessment.threat_score.valueWhen available in the JSON result.
    GTI_severitygti_assessment.severity.valueWhen available in the JSON result.
    GTI_normalized_categoriesCSV of gti_assessment.contributing_factors.normalised_categoriesWhen available in the JSON result.
    GTI_verdictgti_assessment.verdict.valueWhen available in the JSON result.
    GTI_descriptiongti_assessment.descriptionWhen available in the JSON result.
    GGTI_category_{attributes/categories/json key}{attributes/categories/json key value}When available in the JSON result.
  9. TheEnrich Entities action support the following entity enrichment forThreat Actor:
  10. Enrichment fieldSource (JSON key)Applicability
    GTI_motivationsCsv of motivations/nameWhen available in the JSON result.
    GTI_aliasesCsv of alt_names_details/valueWhen available in the JSON result.
    GTI_industriesCsv of targeted_industries/valueWhen available in the JSON result.
    GTI_malwareCsv of malware/nameWhen available in the JSON result.
    GTI_source_regionCSV of source_regions_hierarchy/countryWhen available in the JSON result.
    GTI_target_regionCsv of targeted_regions_hierarchy/countryWhen available in the JSON result.
    GTI_originoriginWhen available in the JSON result.
    GTI_descriptiondescriptionWhen available in the JSON result.
    GTI_last_activity_timelast_activity_timeWhen available in the JSON result.
    GTI_report_linkWe craft it.When available in the JSON result.
  11. TheEnrich Entities action support the following entity enrichment forVulnerability:
  12. Enrichment fieldSource (JSON key)Applicability
    GTI_sourcesCsv of source_nameWhen available in the JSON result.
    GTI_exploitation_stateexploitation_stateWhen available in the JSON result.
    GTI_date_of_disclosuredate_of_disclosureWhen available in the JSON result.
    GTI_vendor_fix_referencesvendor_fix_references/urlWhen available in the JSON result.
    GTI_exploitation_vectorsCsv of exploitation_vectorsWhen available in the JSON result.
    GTI_descriptiondescriptionWhen available in the JSON result.
    GTI_risk_ratingrisk_ratingWhen available in the JSON result.
    GTI_available_mitigationCSV of available_mitigationWhen available in the JSON result.
    GTI_exploitation_consequenceexploitation_consequenceWhen available in the JSON result.
    GTI_report_linkWe craft it.When available in the JSON result.
JSON result

The following example shows the JSON result output for IOCs (IP,Hash,URL,Domain, andHostname entities) received when using theEnrich Entities action:

{[{"Entity":"8b2e701e91101955c73865589a4c72999aeabc11043f7xxxxx","EntityResult":{"is_risky":true,"attributes":{"authentihash":"ad56160b465f7bd1e7568640397f01fc4f8819ce6f0c141569xxxx","creation_date":1410950077,"downloadable":true,"exiftool":{"CharacterSet":"Unicode","CodeSize":"547xx","CompanyName":"MySQL, AB","EntryPoint":"0x39xx","FileDescription":"WinMerge Shell Integration","FileFlagsMask":"0x00xx","FileOS":"Windows NT 32-bit","FileSubtype":"0","FileType":"Win32 EXE","FileTypeExtension":"exe","FileVersion":"1.0.1.6","FileVersionNumber":"1.0.1.6","ImageFileCharacteristics":"Executable, 32-bit","ImageVersion":"0.0","InitializedDataSize":"199168","InternalName":"ShellExtension","LanguageCode":"English (U.S.)","LegalCopyright":"Copyright 2003-2013","LinkerVersion":"10.0","MIMEType":"application/octet-stream","MachineType":"Intel 386 or later, and compatibles","OSVersion":"5.1","ObjectFileType":"Executable application","OriginalFileName":"ShellExtension","PEType":"PE32","ProductName":"ShellExtension","ProductVersion":"1.0.1.6","ProductVersionNumber":"1.0.1.6","Subsystem":"Windows GUI","SubsystemVersion":"5.1","TimeStamp":"2014:09:17 10:34:37+00:00","UninitializedDataSize":"0"},"first_submission_date":1411582812,"last_analysis_date":1606903659,"last_analysis_results":{"ALYac":{"category":"malicious","engine_name":"ALYac","engine_update":"20201202","engine_version":"1.1.1.5","method":"blacklist","result":"Trojan.Foreign.Gen.2"}},"last_analysis_stats":{"confirmed-timeout":0,"failure":0,"harmless":0,"malicious":61,"suspicious":0,"timeout":0,"type-unsupported":5,"undetected":10},"last_modification_date":1606911051,"last_submission_date":1572934476,"magic":"PE32 executable for MS Windows (GUI) Intel 80386 32-bit","md5":"9498ff82a64ff445398c8426exxxx","meaningful_name":"ShellExtension","names":["ShellExtension","ZeuS_binary_9498ff82a64ff445398c8426exxxx.exe","9498ff82a64ff445398c8426exxxx.exe","9498ff82a64ff445398c8426exxxx","2420800","8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdb1xxxxx.exe","sigchxxx.exe","malwxxx.exe"],"reputation":-49,"sha1":"36f9ca40b3ce96fcee1cf1d4a722293553xxxx","sha256":"8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdb1cxxxx","sigma_analysis_stats":{"critical":0,"high":0,"low":4,"medium":0},"sigma_analysis_summary":{"Sigma Integrated Rule Set (GitHub)":{"critical":0,"high":0,"low":4,"medium":0}},"signature_info":{"copyright":"Copyright 2003-2013","description":"WinMerge Shell Integration","file version":"1.0.1.6","internal name":"ShellExtension","original name":"ShellExtension","product":"ShellExtension"},"size":254976,"ssdeep":"6144:Gz90qLc1zR98hUb4UdjzEwG+vqAWiR4EXePbix67CNzjX:Gz90qLc1lWhUbhVqxxxx","tags":["peexe","runtime-modules","direct-cpu-clock-access"],"times_submitted":8,"tlsh":"T1DB44CF267660D833D0DF94316C75C3F9673BFC2123215A6B6A4417699E307Exxxx","total_votes":{"harmless":2,"malicious":7},"trid":[{"file_type":"Win32 Executable MS Visual C++ (generic)","probability":54.3},{"file_type":"Win16 NE executable (generic)","probability":12.2},{"file_type":"Win32 Dynamic Link Library (generic)","probability":11.4},{"file_type":"Win32 Executable (generic)","probability":7.8},{"file_type":"OS/2 Executable (generic)","probability":3.5}],"type_description":"Win32 EXE","type_extension":"exe","type_tag":"peexe","unique_sources":8,"vhash":"025056657d755510804011z9005b9z25z1xxxx"},"id":"8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdbxxxxx","links":{"self":"https://www.virustotal.com/api/v3/files/8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdbxxxx"},"type":"file","comments":[{"attributes":{"date":1595402790,"html":"#malware #Zeus<br /><br />Full genetic report from Intezer Analyze:<br />https://analyze.intezer.com/#/files/8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdbxxxx<br /><br />#IntezerAnalyze","tags":["malware","zeus","intezeranalyze"],"text":"#malware #Zeus\n\nFull genetic report from Intezer Analyze:\nhttps://analyze.intezer.com/#/files/8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdbxxxx\n\n#IntezerAnalyze","votes":{"abuse":0,"negative":0,"positive":0}},"id":"f-8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdbxxxx-9945xxxx","links":{"self":"https://www.virustotal.com/api/v3/comments/f-8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdbxxxx-9945xxx"},"type":"comment"}],"widget_url":"https://www.virustotal.com/ui/widget/html/OGIyZTcwMWU5MTEwMTk1NWM3Mzg2NTU4OWE0YzcyOTk5YWVhYmMxMTA0M2Y3MTJlMDVmZGIxYzE3YzRhYjE5YXx8ZmlsZXx8eyJiZDEiOiAiIzRkNjM4NSIsICJiZzEiOiAiIzMxM2Q1YSIsICJiZzIiOiAiIzIyMmM0MiIsICJmZzEiOiAiI2ZmZmZmZiIsICJ0eXBlIjogImRlZmF1bHQifXx8ZnVsbHx8Zm91bmR8fDE2NDY2NzIzOTN8fGI5OWQ3MTY5MGIzZGY5MmVjMWExNTZlMmQ1MjM3OWJhMGMxYzgyZTAwMjVkMTJmZjg5MWM2YzdjNxxxxxxxxxx","related_mitre_tactics":[{"id":"TA0002","name":"Execution"}],"related_mitre_techniques":[{"id":"T1129","name":"Shared Modules","severity":"INFO"}],"sandboxes_analysis":{"VirusTotal Jujubox":{"attributes":{"registry_keys_opened":["HKCU\\\\SOFTWARE\\\\Microsoft","SOFTWARE\\\\Microsoft\\\\Xuoc"],"calls_highlighted":["GetTickCount"],"tags":["DIRECT_CPU_CLOCK_ACCESS","RUNTIME_MODULES"],"files_written":["C:\\\\Users\\\\<USER>\\\\AppData\\\\Roaming\\\\Uwcyi\\\\xeysv.exe"],"mutexes_opened":["Local\\\\{159989F5-EED2-E258-7F7B-44xxxxxxxxxx}"],"modules_loaded":["ADVAPI32.dll"],"analysis_date":1593005327,"sandbox_name":"VirusTotal Jujubox","has_html_report":true,"behash":"891a0af66a031b044dce08xxxxxxxxxx","has_evtx":false,"text_highlighted":["C:\\\\Windows\\\\system32\\\\cmd.exe"],"last_modification_date":1593005327,"has_memdump":false,"mutexes_created":["Global\\\\{5995CC4B-E3B3-EBC8-9F85-4Bxxxxxxxxxx}"],"has_pcap":true,"files_opened":["C:\\\\Windows\\\\system32\\\\SXS.DLL"]},"type":"file_behaviour","id":"8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdb1xxxxxxxxxx_VirusTotal Jujubox","links":{"self":"https://www.virustotal.com/api/v3/file_behaviours/8b2e701e91101955c73865589a4c72999aeabc11043f712e05fdb1xxxxxxxxxx_VirusTotal Jujubox"}}}}}],"is_risky":true}

The following example shows the JSON result output for Vulnerabilities receivedwhen using theEnrich Entities action:

{"Entity":"CVE-2024-49138","EntityResult":{"targeted_regions":[],"cwe":{"title":"Heap-based Buffer Overflow","id":"CWE-122"},"exploitation_consequence":"Privilege Escalation","source_regions_hierarchy":[],"name":"CVE-2024-49138","cisa_known_exploited":{"ransomware_use":"Unknown","added_date":1733788800,"due_date":1735603200},"analysis":"\n\nOn Dec. 10, 2024, Microsoft stated exploitation of this vulnerability was detected in the wild. For more information, please see [Microsoft's advisory.](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138)\n\n","workarounds":[],"last_modification_date":1738271466,"description":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","sources":[{"title":null,"name":"Cybersecurity and Infrastructure Security Agency (CISA)","source_description":null,"unique_id":null,"url":"https://github.com/cisagov/vulnrichment/blob/develop/2024/49xxx/CVE-2024-49138.json","md5":"d6f2c868480ebbdb413eb2d57524b324","cvss":{"cvssv2_0":null,"cvssv3_x":{"base_score":7.8,"temporal_score":null,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"},"cvssv3_x_translated":null,"cvssv4_x":null},"published_date":1733852988},{"title":"Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability","name":"CISA","source_description":"CISA's Known Exploited Vulnerabilities Catalog","unique_id":null,"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","md5":null,"cvss":{"cvssv2_0":null,"cvssv3_x":null,"cvssv3_x_translated":null,"cvssv4_x":null},"published_date":1733788800}],"mitigations":[],"cve_id":"CVE-2024-49138","creation_date":1733853672,"detection_names":[],"risk_factors":["Local Access Required","User Permissions Required"],"alt_names":[],"exploit_availability":"Publicly Available","cpes":[{"end_rel":"<","start_rel":null,"start_cpe":null,"end_cpe":{"version":"10.0.10240.20857 x64","product":"Windows 10 1507","vendor":"Microsoft","uri":"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20857:*:*:*:*:*:x64:*"}}{"end_rel":"<","start_rel":">=","start_cpe":{"version":"10.0.0","product":"Windows Server 2022","vendor":"Microsoft","uri":"cpe:2.3:o:microsoft:windows_server_2022:10.0.0:*:*:*:*:*:*:*"},"end_cpe":{"version":"10.0.20348.2908","product":"Windows Server 2022","vendor":"Microsoft","uri":"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2908:*:*:*:*:*:*:*"}}],"available_mitigation":["Patch"],"malware_roles":[],"counters":{"files":1,"domains":0,"ip_addresses":0,"urls":0,"iocs":1,"subscribers":1,"attack_techniques":0},"collection_links":[],"domains_count":0,"priority":"P0","files_count":1,"urls_count":0,"alt_names_details":[],"affected_systems":[],"operating_systems":[],"first_seen_details":[],"targeted_informations":[],"recent_activity_summary":[0,0,0,0,0,0,0,0,0,0,0,0,0,0],"merged_actors":[],"date_of_disclosure":1733788800,"tags":["media_attention","observed_in_the_wild","has_exploits","was_zero_day"],"last_seen_details":[],"epss":{"percentile":0.25741,"score":0.00054},"ip_addresses_count":0,"autogenerated_tags":[],"private":true,"executive_summary":"\n\n* A Heap-based Buffer Overflow vulnerability exists that, when exploited, allows a local, privileged attacker to escalate privileges.\n* This vulnerability has been confirmed to be exploited in the wild. Weaponized code is publicly available.\n* Mandiant Intelligence considers this a Medium-risk vulnerability due to the potential for privilege escalation, offset by local access requirements and user permission requirements.\n* Mitigation options include a patch.\n","summary_stats":{},"threat_scape":[],"exploitation_state":"Confirmed","version_history":[{"version_notes":["priority: Added"],"date":1739529103}],"origin":"Google Threat Intelligence","references_count":0,"capabilities":[],"targeted_industries":[],"motivations":[],"predicted_risk_rating":"MEDIUM","cvss":{"cvssv3_x":{"base_score":7.8,"temporal_score":6.8,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"}},"mve_id":"MVE-2024-33694","status":"COMPUTED","exploitation_vectors":["Unspecified Local Vector"],"risk_rating":"MEDIUM","tags_details":[{"last_seen":null,"description":null,"value":"was_zero_day","confidence":"possible","first_seen":null}],"mati_genids_dict":{"cve_id":"vulnerability--012f19f2-00d0-58c8-b981-8b6ce04a8f43","mve_id":"vulnerability--c5ef5265-21d1-57ac-b960-5bf56f37d63f","report_id":null},"technologies":[],"exploitation":{"exploit_release_date":1736899200,"first_exploitation":1733788800,"tech_details_release_date":null},"targeted_industries_tree":[],"subscribers_count":1,"intended_effects":[],"collection_type":"vulnerability","field_sources":[{"field":"cvss.cvssv3_x","source":{"sources":[],"source_url":"","source_name":"Cybersecurity and Infrastructure Security Agency (CISA)","field_type":"Ranked"}},{"field":"exploitation_state","source":{"sources":[],"source_url":"","source_name":"Microsoft Corp.","field_type":"Severity"}}],"vendor_fix_references":[{"title":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","name":"Microsoft Corp.","source_description":null,"unique_id":null,"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138","md5":null,"cvss":null,"published_date":1733817600}],"targeted_regions_hierarchy":[],"top_icon_md5":[],"aggregations":{}}}

The following example shows the JSON result output for Threat Actors receivedwhen using theEnrich Entities action:

{"Entity":"APT42","EntityResult":{"threat_actor_id":"123123""affected_systems":[],"targeted_regions_hierarchy":[{"region":"Oceania","sub_region":"Australia and New Zealand","country":"Australia","country_iso2":"AU","confidence":"confirmed","first_seen":1630467976,"last_seen":1630467976,"description":null,"source":null},{"region":"Europe","sub_region":"Western Europe","country":"Austria","country_iso2":"AT","confidence":"confirmed","first_seen":1630467976,"last_seen":1705487116,"description":null,"source":null}],"recent_activity_relative_change":-0.6340275969799531,"subscribers_count":30,"version_history":[],"field_sources":[],"detection_names":[],"references_count":82,"files_count":1182,"workarounds":[],"threat_scape":[],"alt_names_details":[{"description":null,"first_seen":null,"last_seen":null,"confidence":"confirmed","value":"APT35 (Avertium)"},{"description":null,"first_seen":null,"last_seen":null,"confidence":"confirmed","value":"APT35 (Check Point)"}],"description":"APT42 is an Iranian state-sponsored cyber espionage group tasked with conducting information collection and surveillance operations against individuals and organizations of strategic interest to the Iranian Government. The group's operations, which are designed to build trust and rapport with their victims, have included accessing the personal and corporate email accounts of government officials, former Iranian policymakers or political figures, members of the Iranian diaspora and opposition groups, journalists, and academics who are involved in research on Iran. The group has also deployed mobile malware capable of tracking victim locations, recording phone conversations, accessing videos and images, and extracting entire SMS inboxes.","creation_date":1428278400,"tags":[],"private":true,"available_mitigation":[],"name":"APT42","origin":"Google Threat Intelligence","mitigations":[],"merged_actors":[{"description":"threat-actor--a5ccf0a6-79ab-57cc-98b3-f8ee2e123071","first_seen":1691519658,"last_seen":1691519658,"confidence":"confirmed","value":"UNC4391"},{"description":"threat-actor--20ea26fa-d7ef-51c1-905f-28a2982a0bb5","first_seen":1659365630,"last_seen":1659365630,"confidence":"confirmed","value":"UNC788"},{"description":"threat-actor--f3e232d1-dfea-55f5-b1f0-e8e09c035ee2","first_seen":1704210115,"last_seen":1704210115,"confidence":"confirmed","value":"UNC4980"},{"description":"threat-actor--c7672fb1-f752-54fd-853e-5cbd49dc8187","first_seen":1670883116,"last_seen":1670883116,"confidence":"confirmed","value":"UNC4248"},{"description":"threat-actor--e5f884bd-cb76-5bed-a351-7984d6023b4a","first_seen":1682448032,"last_seen":1682448032,"confidence":"confirmed","value":"UNC4689"},{"description":"threat-actor--a28ebf5f-a384-55c0-a544-c5e4df56b136","first_seen":1693336040,"last_seen":1693336040,"confidence":"confirmed","value":"UNC4423"},{"description":"threat-actor--feb78504-3e56-5217-ad21-7dc9dab8974b","first_seen":1708987865,"last_seen":1708987865,"confidence":"confirmed","value":"UNC2440"},{"description":"threat-actor--d0f848d6-d92f-5147-9bf8-a3b5e93092ff","first_seen":1605743032,"last_seen":1605743032,"confidence":"confirmed","value":"UNC2013"},{"description":"threat-actor--284c29d0-575d-5410-a7f2-dab16e2a5863","first_seen":1605139211,"last_seen":1605139211,"confidence":"confirmed","value":"UNC1896"},{"description":"threat-actor--8d09d09c-6a09-56b5-86ad-c76f3a006d24","first_seen":1605744560,"last_seen":1605744560,"confidence":"confirmed","value":"UNC1137"},{"description":"threat-actor--9d0ac442-9a26-54d7-9061-af1ff9080071","first_seen":1605744040,"last_seen":1605744040,"confidence":"confirmed","value":"UNC978"},{"description":"threat-actor--1aa4e976-a6d0-57b8-861a-478d767f10f5","first_seen":1605137808,"last_seen":1605137808,"confidence":"confirmed","value":"UNC1900"},{"description":"threat-actor--237842b5-7aa3-5674-8c06-257d0f38c4d6","first_seen":1605136271,"last_seen":1605136271,"confidence":"confirmed","value":"UNC2086"},{"description":"threat-actor--bfdfb34f-5dea-5864-b80d-02b9cfeeb6d2","first_seen":1605128797,"last_seen":1605128797,"confidence":"confirmed","value":"UNC2087"},{"description":"threat-actor--cf4e7cfa-2707-5a4a-a543-ef32cd4f5d66","first_seen":1692622313,"last_seen":1692622313,"confidence":"confirmed","value":"UNC4439"},{"description":"threat-actor--60cccdf6-fad7-5706-92df-35aa6111923d","first_seen":1728393601,"last_seen":1728393601,"confidence":"confirmed","value":"UNC5246"}],"intended_effects":[],"urls_count":2617,"targeted_industries_tree":[{"industry_group":"Chemicals & Materials","industry":null,"confidence":"confirmed","first_seen":1665304135,"last_seen":1683023019,"description":null,"source":null}],"alt_names":["APT35 (Google)","Charmingcypress (Volexity)","Voidbalaur (Trend Micro)","Yellow Garuda (PwC)","GreenCharlie (Recorded Future)","Cobalt Illusion (Dell SecureWorks)","UNC788 (Facebook)","Charmingkitten (Kaspersky)","Charming Kitten (Certfa)","APT35 (Avertium)","Charming Kitten (CrowdStrike)","TA453 (Proofpoint)","Charming Kitten (ClearSky)","Charmingkitten (Bitdefender)","TAG-56 (Recorded Future)","ITG18 (IBM)","Charmingkitten (Volexity)","Phosphorus (Check Point)","APT35 (Check Point)","CALANQUE (Google TAG)","Mint Sandstorm (Microsoft)"],"first_seen":1428278400,"counters":{"files":1182,"domains":3888,"ip_addresses":1670,"urls":2617,"iocs":9357,"subscribers":30,"attack_techniques":127},"collection_type":"threat-actor","motivations":[{"description":null,"first_seen":null,"last_seen":null,"confidence":"confirmed","value":"Espionage"},{"description":null,"first_seen":null,"last_seen":null,"confidence":"confirmed","value":"Surveillance"}],"collection_links":[],"targeted_regions":["GB","BE","AT","IL","LB","UA","EG","AU","AZ","IT","US","IR","BG","TR","AE","NO","MY"],"source_regions_hierarchy":[{"region":"Asia","sub_region":"Southern Asia","country":"Iran, Islamic Republic Of","country_iso2":"IR","confidence":"confirmed","first_seen":null,"last_seen":null,"description":null,"source":null}],"malware_roles":[],"last_seen_details":[{"description":null,"first_seen":null,"last_seen":null,"confidence":"confirmed","value":"2025-03-05T17:55:03.551Z"}],"domains_count":3888,"operating_systems":[],"source_region":"IR","targeted_informations":[],"risk_factors":[],"tags_details":[],"ip_addresses_count":1670,"capabilities":[],"targeted_industries":[],"vulnerable_products":"","technologies":[],"recent_activity_summary":[1341,1083,839,656,852,1136,1693,1485,1304,767,893,772,1169,67],"vendor_fix_references":[],"last_seen":1741197303,"autogenerated_tags":["upx","cve-2004-0790","contains-elf","downloads-zip","cve-2021-26084","cve-1999-0016","cve-2018-10561","cve-2021-44228","downloads-elf","contains-embedded-js","cve-2005-0068","base64-embedded","bobsoft","cve-2022-30190","opendir","attachment","cve-2014-3931","cve-2020-7961","contains-pe","cve-2021-1675","downloads-pe","downloads-doc","cve-2017-0199","themida"],"exploitation_vectors":[],"first_seen_details":[{"description":null,"first_seen":null,"last_seen":null,"confidence":"confirmed","value":"2015-04-06T00:00:00Z"}],"last_modification_date":1741314287,"summary_stats":{"first_submission_date":{"min":1234800101.0,"max":1741187401.0,"avg":1689528709.5449305},"last_submission_date":{"min":1366635040.0,"max":1741328711.0,"avg":1714984562.318413},"files_detections":{"min":0.0,"max":70.0,"avg":26.672566371681413},"urls_detections":{"min":0.0,"max":19.0,"avg":7.352873563218389}},"status":"COMPUTED","top_icon_md5":["b8fabacf5f0ce868656ac7a1d38c7c99","4aa5f091c9e667deb2123284461493e7","03234c84e6474d7cc9ecf39b9812fac4"]}}
Output messages

TheEnrich Entities action can return the following output messages:

Output messageMessage description

Successfully enriched the following entities using Google Threat Intelligence:ENTITY_ID

The action wasn't able to enrich the following entities using Google Threat Intelligence:ENTITY_ID

The action didn't enrich any of the provided entities.

The action succeeded.
Error executing action "Enrich Entities". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheEnrich Entities action:

Script result nameValue
is_successTrue orFalse

Enrich IOCs

Use theEnrich IOCs action to enrich the indicators of compromise (IoCs)using information from Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheEnrich IOCs action requires the following parameters:

ParameterDescription
IOC Type

Optional.

The type of the IOC to enrich.

The possible values are as follows:

  • Filehash
  • URL
  • Domain
  • IP Address

The default value isFilehash.

IOCs

Required.

A comma-separated list of IOCs to ingest data.

Action outputs

TheEnrich IOCs action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkAvailable
Case wall tableAvailable
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
Case wall link

TheEnrich IOCs action can provide the following link for every enrichedentity:

Name:Report Link

Value:URL

Case wall table

TheEnrich IOCs action can provide the following table for every enrichedentity:

Table name:IOC_ID

Table columns:

  • Name
  • Category
  • Method
  • Result
JSON result

The following example shows the JSON result output received when using theEnrich IOCs action:

{"ioc":{"identifier":"203.0.113.1","details":{"attributes":{"categories":{"Dr.Web":"known infection source/not recommended site","Forcepoint ThreatSeeker":"compromised websites","sophos":"malware repository, spyware and malware"},"first_submission_date":1582300443,"html_meta":{},"last_analysis_date":1599853405,"last_analysis_results":{"EXAMPLELabs":{"category":"harmless","engine_name":"EXAMPLELabs","method":"blacklist","result":"clean"},"Example":{"category":"harmless","engine_name":"Example","method":"blacklist","result":"clean"}},"last_analysis_stats":{"harmless":64,"malicious":6,"suspicious":1,"timeout":0,"undetected":8},"last_final_url":"http://203.0.113.1/input/?mark=20200207-example.com/31mawe&tpl=example&engkey=bar+chart+click+event","last_http_response_code":404,"last_http_response_content_length":204,"last_http_response_content_sha256":"58df637d178e35690516bda9e41e245db836170f046041fdebeedd20eca61d9d","last_http_response_headers":{"connection":"keep-alive","content-length":"204","content-type":"text/html; charset=iso-8859-1","date":"Fri, 11 Sep 2020 19:51:50 GMT","keep-alive":"timeout=60","server":"nginx"},"last_modification_date":1599853921,"last_submission_date":1599853405,"reputation":0,"tags":["ip"],"targeted_brand":{},"threat_names":["Mal/HTMLGen-A"],"times_submitted":3,"title":"404 Not Found","total_votes":{"harmless":0,"malicious":0},"trackers":{},"url":"http://203.0.113.1/input/?mark=20200207-example.com/31mawe&tpl=example&engkey=bar+chart+click+event"},"id":"ID","links":{"self":"https://www.virustotal.com/api/v3/urls/ID"},"type":"url","report_link":"{generated report link}","widget_url":"https: //www.virustotal.com/ui/widget/html/WIDGET_ID""widget_html"}}}
Output messages

TheEnrich IOCs action can return the following output messages:

Output messageMessage description

Successfully enriched the following IOCs using Google Threat Intelligence:IOC_LIST

No information found for the following IOCs using Google Threat Intelligence:IOC_LIST

No information about IOCs was found.

The action succeeded.
Error executing action "Enrich IOC". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheEnrich IOCs action:

Script result nameValue
is_successTrue orFalse

Execute IOC Search

Use theExecute IOC Search action to run the IOC search in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheExecute IOC Search action requires the following parameters:

ParameterDescription
Search Query

Required.

A search query to run, such ascrowdsourced_yara_rule:*apt* and p:3+ and fs:2d+.

Max Results To Return

Optional.

The maximum number of results to return for every action run.

The maximum value is200.

The default value is50.

Action outputs

TheExecute IOC Search action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theExecute IOC Search action:

{"attributes":{"type_description":"Android","tlsh":"T156B6128BF7885D2BC0B78136899A1136B76A8D254B43A3473548772C3EB32D44F6DBD8","vhash":"8d145b883d0a7f814ba5b130454fbf36","exiftool":{"ZipRequiredVersion":"20","MIMEType":"application/zip","ZipCRC":"0xf27716ce","FileType":"ZIP","ZipCompression":"Deflated","ZipUncompressedSize":"46952","ZipCompressedSize":"8913","FileTypeExtension":"zip","ZipFileName":"Example.xml","ZipBitFlag":"0x0800","ZipModifyDate":"2023:06:11 17:54:18"},"type_tags":["executable","mobile","android","apk"],"crowdsourced_yara_results":["RESULTS_OMITTED"]"magic":"Zip archive data, at least v1.0 to extract, compression method=store","permhash":"a3e0005ad57d3ff03e09e0d055ad10bcf28a58a04a8c2aeccdad2b9e9bc52434","meaningful_name":"Example","reputation":0},"type":"file","id":"FILE_ID","links":{"self":"https://www.virustotal.com/api/v3/files/FILE_ID"}}
Output messages

TheExecute IOC Search action can return the following output messages:

Output messageMessage description

Successfully found results for the provided query in Google Threat Intelligence.

No results were found for the provided query in Google Threat Intelligence.

The action succeeded.
Error executing action "Execute IOC Search". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheExecute IOC Search action:

Script result nameValue
is_successTrue orFalse

Get ASM Entity Details

Use theGet ASM Entity Details action to obtain information about anASM entity in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheGet ASM Entity Details action requires the following parameters:

ParameterDescription
Entity ID

Required.

A comma-separated list of entity IDs to obtain details.

Action outputs

TheGet ASM Entity Details action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theGet ASM Entity Details action:

{"uuid":"UUID","dynamic_id":"Intrigue::Entity::Uri#http://192.0.2.73:80","collection_name":"example_oum28bu","alias_group":8515,"aliases":["http://192.0.2.73:80"],"allow_list":false,"ancestors":[{"type":"Intrigue::Entity::NetBlock","name":"192.0.2.0/24"}],"category":null,"collection_naics":null,"confidence":null,"deleted":false,"deny_list":false,"details":<!CONTENTOMITTED>"http":{"code":404,"title":"404 Not Found","content":{"favicon_hash":null,"hash":null,"forms":false},"auth":{"any":false,"basic":false,"ntlm":false,"forms":false,"2fa":false}},"ports":{"tcp":[80],"udp":[],"count":1},"network":{"name":"Example, Inc.","asn":16509,"route":null,"type":null},"technology":{"cloud":true,"cloud_providers":["Example Services"],"cpes":[],"technologies":[],"technology_labels":[]},"vulns":{"current_count":0,"vulns":[]}},{"tags":[],"id":8620,"scoped_at":"2022-09-30 06:51:57 +0000","detail_string":"Fingerprint: Nginx |  Title: 404 Not Found","enrichment_tasks":["enrich/uri","sslcan"],"generated_at":"2022-09-30T21:21:18Z"}
Output messages

TheGet ASM Entity Details action can return the following output messages:

Output messageMessage description

Successfully returned details for the following entities using information from Google Threat Intelligence:ENTITY_ID

The action wasn't able to return details for the following entities using information from Google Threat Intelligence:ENTITY_ID

The action succeeded.
Error executing action "Get ASM Entity Details". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheGet ASM Entity Details action:

Script result nameValue
is_successTrue orFalse

Get Graph Details

Use theGet Graph Details action to obtain detailed information about graphsin Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheGet Graph Details action requires the following parameters:

ParameterDescription
Graph ID

Required.

A comma-separated list of graph IDs to retrieve details.

Max Links To Return

Required.

The maximum number of links to return for each graph.

The default value is50.

Action outputs

TheGet Graph Details action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableAvailable
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
Case wall table

TheGet Graph Details action can provide the following table for everyenriched entity:

Table name:GraphGRAPH_ID Links

Table columns:

  • Source
  • Target
  • Connection Type
JSON result

The following example shows the JSON result output received when using theGet Graph Details action:

{"data":{"attributes":{"comments_count":0,"creation_date":1603219837,"graph_data":{"description":"Example LLC","version":"api-5.0.0"},"last_modified_date":1603219837,"links":[{"connection_type":"last_serving_ip_address","source":"ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671","target":"relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"},{"connection_type":"last_serving_ip_address","source":"relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671","target":"203.0.113.3"},{"connection_type":"network_location","source":"ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671","target":"relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671"},{"connection_type":"network_location","source":"relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671","target":"203.0.113.3"},{"connection_type":"communicating_files","source":"203.0.113.3","target":"relationships_communicating_files_20301133"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"4935cc8a4ff76d595e1bfab9fd2e6aa0f7c2fea941693f1ab4586eaba1528f47"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"c975794ff65c02b63fae1a94006a75294aac13277ca464e3ea7e40de5eda2b14"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"c7752154a2e894a4dec84833bee656357f4b84a9c7f601f586f79de667d8fe5c"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"692bb2ed1da43b0408c104b4ca4b4e97e15f3224e37dbea60214bcd991a2cfd3"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"74273ef55d8b7d23f7b058c7e47f3cbaf60c823a3e41ffb10e494917bad77381"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"f4f2f17c4df1b558cb80c8eab3edf5198970e9d87bd03943d4c2effafb696187"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"5edc8496869697aa229540bd6106b6679f6cfcbc6ee4837887183f470b49acb5"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"1582da57cb082d3f6835158133aafb5f3b8dcc880a813be135a0ff8099cf0ee8"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"be4ccb1ca71a987f481c22a1a43de491353945d815c89cbcc06233d993ac73cf"},{"connection_type":"communicating_files","source":"relationships_communicating_files_20301133","target":"60bb6467ee465f23a15f17cd73f7ecb9db9894c5a3186081a1c70fdc6e7607d6"}],"nodes":[{"entity_attributes":{"has_detections":false},"entity_id":"ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671","index":0,"text":"","type":"url","x":51.22276722115952,"y":65.7811310194184},{"entity_attributes":{},"entity_id":"relationships_last_serving_ip_address_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671","index":1,"text":"","type":"relationship","x":25.415664700492094,"y":37.66636498768037},{"entity_attributes":{"country":"US"},"entity_id":"203.0.113.3","fx":-19.03611541222395,"fy":24.958500220062717,"index":2,"text":"","type":"ip_address","x":-19.03611541222395,"y":24.958500220062717},{"entity_attributes":{},"entity_id":"relationships_network_location_ea241b193c1bd89f999db9231359e7479bc2f05105ce43964955068c5d7c4671","index":3,"text":"","type":"relationship","x":14.37403861978968,"y":56.85562691824892},{"entity_attributes":{},"entity_id":"relationships_communicating_files_20301133","index":4,"text":"","type":"relationship","x":-51.78097726144755,"y":10.087893225996158},{"entity_attributes":{"has_detections":true,"type_tag":"peexe"},"entity_id":"4935cc8a4ff76d595e1bfab9fd2e6aa0f7c2fea941693f1ab4586eaba1528f47","index":5,"text":"","type":"file","x":-79.11606194776019,"y":-18.475026322309112},{"entity_attributes":{"has_detections":true,"type_tag":"peexe"},"entity_id":"c975794ff65c02b63fae1a94006a75294aac13277ca464e3ea7e40de5eda2b14","index":6,"text":"","type":"file","x":-64.80938048199627,"y":46.75892061191275},{"entity_attributes":{"has_detections":true,"type_tag":"android"},"entity_id":"c7752154a2e894a4dec84833bee656357f4b84a9c7f601f586f79de667d8fe5c","index":7,"text":"","type":"file","x":-43.54064004476819,"y":-28.547923020662786},{"entity_attributes":{"has_detections":true,"type_tag":"android"},"entity_id":"692bb2ed1da43b0408c104b4ca4b4e97e15f3224e37dbea60214bcd991a2cfd3","index":8,"text":"","type":"file","x":-15.529860440278318,"y":-2.068209789825876},{"entity_attributes":{"has_detections":true,"type_tag":"android"},"entity_id":"74273ef55d8b7d23f7b058c7e47f3cbaf60c823a3e41ffb10e494917bad77381","index":9,"text":"","type":"file","x":-42.55971948293377,"y":46.937155845680415},{"entity_attributes":{"has_detections":true,"type_tag":"html"},"entity_id":"f4f2f17c4df1b558cb80c8eab3edf5198970e9d87bd03943d4c2effafb696187","index":10,"text":"","type":"file","x":-62.447976875107706,"y":-28.172418384729067},{"entity_attributes":{"has_detections":true,"type_tag":"android"},"entity_id":"5edc8496869697aa229540bd6106b6679f6cfcbc6ee4837887183f470b49acb5","index":11,"text":"","type":"file","x":-89.0326649183805,"y":-2.2638551448322484},{"entity_attributes":{"has_detections":true,"type_tag":"android"},"entity_id":"1582da57cb082d3f6835158133aafb5f3b8dcc880a813be135a0ff8099cf0ee8","index":12,"text":"","type":"file","x":-26.35260716195174,"y":-20.25669077264115},{"entity_attributes":{"has_detections":true,"type_tag":"android"},"entity_id":"be4ccb1ca71a987f481c22a1a43de491353945d815c89cbcc06233d993ac73cf","index":13,"text":"","type":"file","x":-82.1415994911387,"y":34.89636762607467},{"entity_attributes":{"has_detections":true,"type_tag":"android"},"entity_id":"ENTITY_ID","index":14,"text":"","type":"file","x":-90.87738694680043,"y":16.374462198116138}],"private":false,"views_count":30},"id":"ID","links":{"self":"https://www.virustotal.com/api/v3/graphs/ID"},"type":"graph"}}
Output messages

TheGet Graph Details action can return the following output messages:

Output messageMessage description

Successfully returned details about the following graphs in Google Threat Intelligence:GRAPH_IDS

Action wasn't able to return details about the following graphs in Google Threat Intelligence:GRAPH_IDS

No information about the provided graphs was found.

The action succeeded.
Error executing action "Get Graph Details". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheGet Graph Details action:

Script result nameValue
is_successTrue orFalse

Get Related Associations

Use theGet Related Associations action to get information aboutassociations (reports, campaigns, collections, malware families, softwaretoolkits, vulnerabilities, threat actors) related toentities in Google Threat Intelligence.

This action runs on the following Google SecOps entities:

  • IP address
  • URL
  • File hash
  • Hostname
  • Domain
Note: This action only supports MD5, SHA-1, and SHA-256 hashes.

Action inputs

TheGet Related Associations action requires the following parameters:

ParameterDescription
Association Types

Optional.

A comma-separated list of associations to return.

Reports are processed after all other associations are complete.

The possible values are as follows:

  • Report
  • Campaign
  • Collection
  • Malware Family
  • Vulnerability
  • Threat Actor

If no value is provided, the action returns all associations.

Create Entity

Optional.

If selected, the action creates an entity for related Threat Actors, Common Vulnerabilities and Exposures (CVEs), and Campaigns, linking it to the original entity.

Only CVE, Threat Actor, and Campaign entities are created.

Max Associations To Return

Optional.

The maximum number of IoCs to return for every entity.

The maximum value is100.

The default value is50.

Action outputs

TheGet Related Associations action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script result.Available
JSON result

The following example shows the JSON result output received when using theGet Related Associations action:

{   "Entity":"",   "EntityResult":        {           "campaign":[               {                   "id":"campaign--a1b2c3d4-e5f6-7g8h-9i0j-1k2l3m4n5o6p",                   "type":"collection",                   "links":{                       "self":"https://www.virustotal.com/api/v3/collections/campaign--a1b2c3d4-e5f6-7g8h-9i0j-1k2l3m4n5o6p"                   },                   "attributes":{                       "alt_names":[                           "CAMPAIGN.ID.001"                       ],                       "alt_names_details":[                           {                               "description":null,                               "last_seen":null,                               "value":"CAMPAIGN.ID.001",                               "first_seen":null,                               "confidence":"confirmed"                           }                       ],                       "recent_activity_relative_change":0.12215909090909083,                       "description":"Security Research Team (SRT) has obtained intelligence surrounding an ongoing campaign involving the deployment of a Custom Infostealer followed by local reconnaissance and data exfiltration.\n\nBased on available intelligence, targeted organizations have been located in Western European countries, primarily within the Consulting and Manufacturing sectors; however, targeting appears opportunistic due to deployment methods. The campaign is being conducted by a threat actor SRT tracks as UNC9999 and assesses with high confidence to have financial motivations.",                       "version_history":[],                       "targeted_regions":[                           "WE",                           "NE"                       ],                       "private":true,                       "subscribers_count":0,                       "last_seen":1751241600,                       "files_count":2,                       "first_seen_details":[                           {                               "description":"Observed First Activity of Campaign",                               "last_seen":null,                               "value":"2024-10-09T00:00:00Z",                               "first_seen":null,                               "confidence":"unconfirmed"                           }                       ],                       "detection_names":[],                       "targeted_industries":[],                       "technologies":[],                       "source_regions_hierarchy":[],                       "references_count":5,                       "domains_count":70,                       "name":"Financial Actor Campaign Involving Custom Stealer for Data Exfiltration",                       "intended_effects":[],                       "creation_date":1751304756,                       "malware_roles":[],                       "available_mitigation":[],                       "last_seen_details":[                           {                               "description":null,                               "last_seen":null,                               "value":"2025-06-30T00:00:00Z",                               "first_seen":null,                               "confidence":"unconfirmed"                           }                       ],                       "summary_stats":{                           "first_submission_date":{                               "min":1724454065.0,                               "max":1750144019.0,                               "avg":1736406949.275                           },                           "last_submission_date":{                               "min":1724454065.0,                               "max":1750312785.0,                               "avg":1737423800.3916667                           },                           "files_detections":{                               "min":23.0,                               "max":23.0,                               "avg":23.0                           },                           "urls_detections":{                               "min":0.0,                               "max":19.0,                               "avg":3.9999999999999996                           }                       },                       "is_content_translated":false,                       "targeted_industries_tree":[                           {                               "industry_group":"Consulting",                               "industry":null,                               "confidence":"confirmed",                               "first_seen":null,                               "last_seen":null,                               "description":null,                               "source":null                           },                           {                               "industry_group":"Legal Services",                               "industry":null,                               "confidence":"confirmed",                               "first_seen":null,                               "last_seen":null,                               "description":null,                               "source":null                           },                           {                               "industry_group":"Manufacturing & Logistics",                               "industry":null,                               "confidence":"confirmed",                               "first_seen":null,                               "last_seen":null,                               "description":null,                               "source":null                           }                       ],                       "threat_scape":[],                       "ip_addresses_count":10,                       "collection_links":[],                       "targeted_informations":[],                       "operating_systems":[],                       "urls_count":118,                       "first_seen":1728432000,                       "status":"COMPUTED",                       "collection_type":"campaign",                       "campaign_type":"INDIVIDUAL",                       "recent_activity_summary":[                           70,                           17,                           29,                           17,                           24,                           14,                           15,                           25,                           23,                           44,                           37,                           25,                           19,                           36                       ],                       "exploitation_vectors":[],                       "mitigations":[],                       "vendor_fix_references":[],                       "risk_factors":[],                       "field_sources":[],                       "motivations":[                           {                               "description":null,                               "last_seen":null,                               "value":"Monetary",                               "first_seen":null,                               "confidence":"confirmed"                           }                       ],                       "tags":[],                       "affected_systems":[],                       "tags_details":[],                       "top_icon_md5":[                           "1a2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d",                           "6d5c4b3a2f1e0d9c8b7a6f5e4d3c2b1a",                           "3a4b5c6d1e2f3a4b5c6d1e2f3a4b5c6d"                       ],                       "counters":{                           "files":2,                           "domains":70,                           "ip_addresses":10,                           "urls":118,                           "iocs":200,                           "subscribers":0,                           "attack_techniques":22                       },                       "merged_actors":[],                       "origin":"Security Research Team",                       "capabilities":[],                       "autogenerated_tags":[                           "contains-sample-binary"                       ],                       "targeted_regions_hierarchy":[                           {                               "region":"Europe",                               "sub_region":"Western Europe",                               "country":"Example Country 1",                               "country_iso2":"C1",                               "confidence":"confirmed",                               "first_seen":null,                               "last_seen":null,                               "description":null,                               "source":null                           },                           {                               "region":"Europe",                               "sub_region":"Northern Europe",                               "country":"Example Country 2",                               "country_iso2":"C2",                               "confidence":"confirmed",                               "first_seen":null,                               "last_seen":null,                               "description":null,                               "source":null                           }                       ],                       "workarounds":[],                       "last_modification_date":1751406304                   },                   "context_attributes":{                       "shared_with_me":false,                       "role":"viewer"                   }               }           ]       }   }
Output messages

TheGet Related Associations action can return the following output messages:

Output messageMessage description

Successfully found associations for the following entities in Google Threat Intelligence:ENTITY_ID.

No related Associations were found for the following entities in Google Threat Intelligence:ENTITY_ID.

No related associations were found for the provided entities in Google Threat Intelligence.

The action succeeded.
Error executing action "Get Related Associations". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheGet Related Associations action:

Script result nameValue
is_successTrue orFalse

Get Related IOCs

Use theGet Related IOCs action to get information about IOCs related toentities using information from Google Threat Intelligence.

This action only supports MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • IP address
  • URL
  • Hostname
  • Domain
  • Hash
  • Threat Actor

Action inputs

TheGet Related IOCs action requires the following parameters:

ParameterDescription
IOC Types

Required.

A comma-separated list of IOCs to extract.

The possible values are as follows:IP,Hash,URL,Domain.

Max IOCs To Return

Required.

The maximum number of IOCs to return for selected IOC types for every entity.

The default value is40.

Action outputs

TheGet Related IOCs action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultNot available
Output messagesAvailable
Script result.Available
JSON result

The following example shows the JSON result output received when using theGet Related IOCs action:

{"Entity":"ENTITY","EntityResult":{"hash":["HASH"],"url":["URL"],"domain":["DOMAIN"],"ip":["IP_ADDRESS"]}}
Output messages

TheGet Related IOCs action can return the following output messages:

Output messageMessage description

Successfully returned related IOCs for the following entities in Google Threat Intelligence:ENTITY

No related IOCs were found for the following entities in Google Threat Intelligence:ENTITY.

No related IOCs were found for the provided entities.

The action succeeded.
Error executing action "Get Related IOCs". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheGet Related IOCs action:

Script result nameValue
is_successTrue orFalse

Ping

Use thePing action to test the connectivity toGoogle Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

None.

Action outputs

ThePing action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultNot available
Output messagesAvailable
Script result.Available
Output messages

ThePing action can return the following output messages:

Output messageMessage description

Successfully connected to the Google Threat Intelligence server with the provided connection parameters!

The action succeeded.
Failed to connect to the Google Threat Intelligence server! Error isERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingthePing action:

Script result nameValue
is_successTrue orFalse

Private Submit URL

Use thePrivate Submit URL action to submit a URL for a private scan withinGoogle Threat Intelligence.

This action runs on the following Google SecOps entity:

  • URL
Note: For a regular scan and entity enrichment, usetheEnrich Entities action instead.

Action inputs

ThePrivate Submit URL action requires the following parameters:

ParameterDescription
URL

Optional.

A comma-separated list of URLs to scan.

The system processes entered values alongside any URL entities that the operation discovers.

Check Existing Submissions First

Optional.

If selected, this action checks the URL for existing public or private submission information. If found, the action immediately returns the information, bypassing the submission flow.

Disabled by default.

Resubmit After (Days)

Optional.

The minimum number of days that must pass after the URL's last public analysis date for the URL to become eligible for resubmission.

Note: To use this parameter, you must enableCheck Existing Submissions First.

The default value is30.

Action outputs

ThePrivate Submit URL action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkAvailable
Case wall tableNot available
Enrichment tableAvailable
JSON resultAvailable
Output messagesAvailable
Script result.Available
Case wall link

ThePrivate Submit URL action can return the following link:

Report LinkURL:URL to the GTI UI displaying the submissiondetails.

Entity enrichment table

ThePrivate Submit URL action supports the following entity enrichment forURL entities when data is retrieved from a public submission:

Enrichment fieldSource (JSON key)Applicability
GTI_ididWhen available in the JSON result.
GTI_titletitleWhen available in the JSON result.
GTI_last_http_response_codelast_http_response_codeWhen available in the JSON result.
GTI_last_http_response_content_lengthlast_http_response_content_lengthWhen available in the JSON result.
GTI_threat_namesComma-separated list ofthreat_namesWhen available in the JSON result.
GTI_harmless_countlast_analysis_stats/harmlessWhen available in the JSON result.
GTI_malicious_countlast_analysis_stats/maliciousWhen available in the JSON result.
GTI_suspicious_countlast_analysis_stats/suspiciousWhen available in the JSON result.
GTI_undetected_countlast_analysis_stats/undetectedWhen available in the JSON result.
GTI_reputationreputationWhen available in the JSON result.
GTI_tagsComma-separated list oftagsWhen available in the JSON result.
GTI_malicious_vote_counttotal_votes/maliciousWhen available in the JSON result.
GTI_harmless_vote_counttotal_votes/harmlessWhen available in the JSON result.
GTI_report_linkreport linkWhen available in the JSON result.
GTI_widget_linkwidget_urlWhen available in the JSON result.
GTI_threat_scoregti_assessment.threat_score.valueWhen available in the JSON result.
GTI_severitygti_assessment.severity.valueWhen available in the JSON result.
GTI_normalised_categoriesCSV ofgti_assessment.contributing_factors.normalised_categoriesWhen available in the JSON result.
GTI_verdictgti_assessment.verdict.valueWhen available in the JSON result.
GTI_descriptiongti_assessment.descriptionWhen available in the JSON result.
GTI_category_{attributes/categories/json key}{attributes/categories/json key value}When available in the JSON result.

ThePrivate Submit URL action supports the following entity enrichment forURL entities when data is retrieved from a private submission:

Enrichment fieldSource (JSON key)Applicability
GTI_ididWhen available in the JSON result.
GTI_titletitleWhen available in the JSON result.
GTI_last_http_response_codelast_http_response_codeWhen available in the JSON result.
GTI_last_http_response_content_lengthlast_http_response_content_lengthWhen available in the JSON result.
GTI_tagsComma-separated list oftagsWhen available in the JSON result.
GTI_report_linkreport linkWhen available in the JSON result.
GTI_widget_linkwidget_urlWhen available in the JSON result.
JSON result

The following example shows the JSON result output received when using thePrivate Submit URL action:

{"Entity":"","EntityResult":[{"data":{"id":"test_id_1234567890abcdef1234567890abcdef1234567890abcdef1234567890a","type":"private_url","links":{"self":"https://www.googlethreatintelligence.com/api/v3/private/urls/test_id_1234567890abcdef1234567890abcdef1234567890abcdef1234567890a"},"attributes":{"last_http_response_content_length":23475,"tags":["password-input","iframes","external-resources"],"title":"Example Financial Institution","redirection_chain":["http://www.example-test-site.com/"],"last_final_url":"https://www.example-test-site.com/","last_http_response_content_sha256":"test_sha256_000000000000000000000000000000000000000000000000000000000000","favicon":{"raw_md5":"test_md5_0000000000000000000000000000","dhash":"075171c1878e82c0"},"last_http_response_code":200,"tld":"com","html_meta":{"viewport":["width=device-width, initial-scale=1, shrink-to-fit=no"]},"expiration":1760512221,"last_http_response_headers":{"cache-control":"no-store, no-cache, must-revalidate","content-encoding":"br","date":"Tue, 14 Oct 2025 07:10:28 GMT","expires":"Thu, 19 Nov 1981 08:52:00 GMT","platform":"hostinger","server":"LiteSpeed","vary":"Accept-Encoding","content-security-policy":"upgrade-insecure-requests","content-type":"text/html; charset=UTF-8","panel":"hpanel","pragma":"no-cache","x-powered-by":"PHP/7.3.33","alt-svc":"h3=\":443\"; ma=2592000, h3-29=\":443\"; ma=2592000, h3-Q050=\":443\"; ma=2592000, h3-Q046=\":443\"; ma=2592000, h3-Q043=\":443\"; ma=2592000, quic=\":443\"; ma=2592000; v=\"43,46\""},"url":"http://www.example-test-site.com/","outgoing_links":["https://www.jivochat.com/i_sa/?utm_source=www.solentrcu.com&utm_medium=link&utm_content=label_tooltip&utm_campaign=from_widget","https://code.jivosite.com/sounds/agent_message.mp3",// ... other outgoing links maintained for structure]}}}]}
Output messages

ThePrivate Submit URL action can return the following output messages:

Output messageMessage description

Successfully returned information about the following URLs in Google Threat Intelligence:URLS.

Action couldn't find information about the following URLs in Google Threat Intelligence:URLS.

None of the provided URLs were processed in Google Threat Intelligence.

The action succeeded.
Error executing action "Private Submit URL". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingthePrivate Submit URL action:

Script result nameValue
is_successtrue orfalse

Search ASM Entities

Use theSearch ASM Entities action to search for ASM entities inGoogle Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheSearch ASM Entities action requires the following parameters:

ParameterDescription
Project Name

Optional.

The name of the ASM project.

If you don't set a value, the action uses the value that you configured for theASM Project Name integration parameter.

Entity Name

Optional.

A comma-separated list of entity names to find entities.

The action treats entity names that contain/ forward slashes as invalid values.

Minimum Vulnerabilities Count

Optional.

The minimum number of vulnerabilities required for the action to return the entity.

Minimum Issues Count

Optional.

The minimum number of issues required for the action to return the entity.

Tags

Optional.

A comma-separated list of tag names to use when searching for entities.

Max Entities To Return

Optional.

The number of entities to return.

The maximum value is200. The default value is50.

Critical or High Issue

Optional.

If selected, the action only returns issues withHigh andCritical severity.

Not selected by default.

Action outputs

TheSearch ASM Entities action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theSearch ASM Entities action:

{"id":"ID","dynamic_id":"Intrigue::Entity::IpAddress#192.0.2.92","alias_group":"1935953","name":"192.0.2.92","type":"Intrigue::Entity::IpAddress","first_seen":"2022-02-02T01:44:46Z","last_seen":"2022-02-02T01:44:46Z","collection":"cpndemorange_oum28bu","collection_type":"Intrigue::Collections::UserCollection","collection_naics":[],"collection_uuid":"COLLECTION_UUID","organization_uuid":"ORGANIZATION_UUID","tags":[],"issues":[],"exfil_lookup_identifier":null,"summary":{"scoped":true,"issues":{"current_by_severity":{},"current_with_cve":0,"all_time_by_severity":{},"current_count":0,"all_time_count":0,"critical_or_high":false},"task_results":["search_shodan"],"geolocation":{"city":"San Jose","country_code":"US","country_name":null,"latitude":"-121.8896","asn":null},"ports":{"count":0,"tcp":null,"udp":null},"resolutions":["ec2-192-0-2-92.us-west-1.compute.example.com"],"network":{"name":"EXAMPLE-02","asn":"16509.0","route":"2001:db8::/32","type":null},"technology":{"cloud":true,"cloud_providers":["Cloud Provider Name"]}}}
Output messages

TheSearch ASM Entities action can return the following output messages:

Output messageMessage description

Successfully returned entities based on the provided criteria in Google Threat Intelligence.

No entities were found based on the provided criteria in Google Threat Intelligence.

The action succeeded.
Error executing action "Search ASM Entities". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheSearch ASM Entities action:

Script result nameValue
is_successTrue orFalse

Search ASM Issues

Use theSearch ASM Issues action to search for ASM issues inGoogle Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheSearch ASM Issues action requires the following parameters:

ParameterDescription
Project Name

Optional.

The name of the ASM project.

If you don't set a value, the action uses the value that you configured for theASM Project Name integration parameter.

Issue ID

Optional.

A comma-separated list of issue IDs to return the details.

Entity ID

Optional.

A comma-separated list of entity IDs to find related issues.

Entity Name

Optional.

A comma-separated list of entity names to find related issues.

The action treats entity names that contain/ forward slashes as invalid values.

Time Parameter

Optional.

A filter option to set the issue time.

The possible values areFirst Seen andLast Seen.

The default value isFirst Seen.

Time Frame

Optional.

A period to filter issues. If you selectCustom, configure theStart Time parameter.

The possible values are as follows:

  • Last Hour
  • Last 6 Hours
  • Last 24 Hours
  • Last Week
  • Last Month
  • Custom

The default value isLast Hour.

Start Time

Optional.

The start time for the results.

If you selectedCustom for theTime Frame parameter, this parameter is required.

Configure the value in the ISO 8601 format.

End Time

Optional.

The end time for the results.

If you selectedCustom for theTime Frame parameter and didn't set the end time, this parameter uses the current time as the end time.

Configure the value in the ISO 8601 format.

Lowest Severity To Return

Optional.

The lowest severity of the issues to return.

The possible values are as follows:

  • Select One
  • Critical
  • High
  • Medium
  • Low
  • Informational

The default value isSelect One.

If you selectSelect One, this filter doesn't apply to the search.

Status

Optional.

The status filter for the search.

The possible values areOpen,Closed, andSelect One.

The default value isSelect One.

If you selectSelect One, this filter doesn't apply to the search.

Tags

Optional.

A comma-separated list of tag names to use when searching for issues.

Max Issues To Return

Required.

The number of issues to return.

The maximum value is200. The default value is50.

Action outputs

TheSearch ASM Issues action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableAvailable
JSON resultNot available
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theSearch ASM Issues action:

{"id":"ID","uuid":"UUID","dynamic_id":20073997,"name":"exposed_ftp_service","upstream":"intrigue","last_seen":"2022-02-02T01:44:46.000Z","first_seen":"2022-02-02T01:44:46.000Z","entity_uid":"3443a638f951bdc23d3a089bff738cd961a387958c7f5e4975a26f12e544241f","entity_type":"Intrigue::Entity::NetworkService","entity_name":"192.0.2.204:24/tcp","alias_group":"1937534","collection":"example_oum28bu","collection_uuid":"511311a6-6ff4-4933-8f5b-f1f7df2f6a3e","collection_type":"user_collection","organization_uuid":"21d2d125-d398-4bcb-bae1-11aee14adcaf","summary":{"pretty_name":"Exposed FTP Service","severity":3,"scoped":true,"confidence":"confirmed","status":"open_new","category":"misconfiguration","identifiers":null,"status_new":"open","status_new_detailed":"new","ticket_list":null},"tags":[]}
Output messages

TheSearch ASM Issues action can return the following output messages:

Output messageMessage description

Successfully returned issues based on the provided criteria in Google Threat Intelligence.

No issues were found based on the provided criteria in Google Threat Intelligence.

The action succeeded.
Error executing action "Search ASM Issues". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheSearch ASM Issues action:

Script result nameValue
is_successTrue orFalse

Search Entity Graphs

Use theSearch Entity Graphs action to search graphs that are based onGoogle SecOps entities in Google Threat Intelligence.

This action only supports MD5, SHA-1, and SHA-256 hashes.

This action runs on the following Google SecOps entities:

  • Domain
  • File Hash
  • Hostname
  • IP Address
  • Threat Actor
  • URL
  • User

Action inputs

TheSearch Entity Graphs action requires the following parameters:

ParameterDescription
Sort Field

Optional.

The field value to sort the results.

The possible values are as follows:

  • Owner
  • Creation Date
  • Last Modified Date
  • Views Count
  • Comments Count

The default value isOwner.

Max Graphs To Return

Optional.

The maximum number of graphs to return for every action run.

The default value is10.

Action outputs

TheSearch Entity Graphs action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theSearch Entity Graphs action:

{"data":[{"attributes":{"graph_data":{"description":"EXAMPLE","version":"5.0.0"}},"id":"ID"}]}
Output messages

TheSearch Entity Graphs action can return the following output messages:

Output messageMessage description

Successfully returned graphs based on the provided entities in Google Threat Intelligence.

Action wasn't able to successfully return graph based on the provided entities in Google Threat Intelligence. Reason:ERROR_REASON.

No graphs were found for the provided entities.

The action succeeded.
Error executing action "Search Entity Graphs". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Search Graphs

Use theSearch Graphs action to search graphs based on custom filters inGoogle Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheSearch Graphs action requires the following parameters:

ParameterDescription
Query

Required.

The query filter for the graph.

For example, to search for graphs in the selected period, format the query as follows:creation_date:2018-11-1+creation_date:2018-11-12

For more information about queries, seeHow to create queries,Graph-related modifiers, andNode-related modifiers.

Sort Field

Optional.

The field value to sort the VirusTotal graphs.

The possible values are as follows:

  • Comments Count
  • Creation Date
  • Last Modified Date
  • Owner
  • Views Count

The default value isOwner.

Max Graphs To Return

Optional.

The maximum number of graphs to return for every action run.

The default value is10.

How to create queries

To refine search results from graphs, create queries that containgraph-relatedmodifiers. To improve the search, you can combinemodifiers withAND,OR, andNOT operators.

Date and numeric fields support the+ plus and- minus suffixes. A plussuffix matches values greater than the provided value. A minus suffix matchesvalues less than the provided value. Without a suffix, the query returns exactmatches.

To define ranges, you can use the same modifier multiple times in a query. Forexample, to search graphs that are created between 2018-11-15 and 2018-11-20,use the following query:

creation_date:2018-11-15+ creation_date:2018-11-20-

For dates or months that begin with0, remove the0 character in the query.For example, format the date of 2018-11-01 as2018-11-1.

Graph-related modifiers

The following table lists graph-related modifiers which you can use to constructthe search query:

Modifier nameDescriptionExample
idFilters by graph identifier.id:g675a2fd4c8834e288af
nameFilters by graph name.name:Example-name
ownerFilters by graphs owned by the user.owner:example_user
groupFilters by graphs owned by a group.group:example
visible_to_userFilters by graphs visible to the user.visible_to_user:example_user
visible_to_groupFilters by graphs visible to the group.visible_to_group:example
privateFilters by private graphs.private:true,private:false
creation_dateFilters by the graph creation date.creation_date:2018-11-15
last_modified_dateFilters by the latest graph modification date.last_modified_date:2018-11-20
total_nodesFilters by graphs that contain a specific number of nodes.total_nodes:100
comments_countFilters by the number of comments in the graph.comments_count:10+
views_countFilters by the number of graph views.views_count:1000+

Node-related modifiers

The following table lists graph-related modifiers which you can use to constructthe search query:

Modifier nameDescriptionExample
labelFilters by graphs that contain nodes with a specific label.label:Kill switch
fileFilters by graphs that contain the specific file.file:131f95c51cc819465fa17
domainFilters by graphs that contain the specific domain.domain:example.com
ip_addressFilters by graphs that contain the specific IP address.ip_address:203.0.113.1
urlFilters by graphs that contain the specific URL.url:https://example.com/example/
actorFilters by graphs that contain the specific actor.actor:example actor
victimFilters by graphs that contain the specific victim.victim:example_user
emailFilters by graphs that contain the specific email address.email:user@example.com
departmentFilters by graphs that contain the specific department.department:engineers

Action outputs

TheSearch Graphs action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theSearch Graphs action:

{"data":[{"attributes":{"graph_data":{"description":"EXAMPLE","version":"5.0.0"}},"id":"ID"}]}
Output messages

TheSearch Graphs action can return the following output messages:

Output messageMessage description

Successfully returned graphs for the provided query in Google Threat Intelligence.

No graphs were found for the provided query.

The action succeeded.
Error executing action "Search Graphs". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheSearch Graphs action:

Script result nameValue
is_successTrue orFalse

Set DTM Alert Analysis

Use theSet DTM Alert Analysis action to define an analysis for a Digital ThreatMonitoring (DTM) alert in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheSet DTM Alert Analysis action requires the following parameters:

ParameterDescription
Alert ID

Required.

The ID of the alert to add the analysis to.

Text

Required.

The analysis to add to the alert.

Attachment File Paths

Optional.

A comma-separated list of file paths to attach to the alert.

A maximum of 10 attachments is supported.

Action outputs

TheSet DTM Alert Analysis action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultNot available
Output messagesAvailable
Script result.Available
Output messages

TheSet DTM Alert Analysis action can return the following output messages:

Output messageMessage description

Successfully updated the alert with the IDALERT_ID in Google Threat Intelligence.

The action succeeded.
Error executing action "Set DTM Alert Analysis". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheSet DTM Alert Analysis action:

Script result nameValue
is_successTrue orFalse

Submit File

Use theSubmit File action to submit a file and return results fromGoogle Threat Intelligence.

This action doesn't run on Google SecOps entities.

This action is asynchronous. Adjust the script timeout value in theGoogle SecOps integrated development environment (IDE) for theaction as needed.

Action inputs

TheSubmit File action requires the following parameters:

ParameterDescription
GTI Score

Optional.

The Google Threat Intelligence score used to set theis_risky property totrue in the JSON result. This condition is validated alongside Google Threat Intelligence verdict information.

If no value is provided, the action ignores the Google Threat Intelligence score.

The default value is60.

Engine Threshold

Optional.

The minimum number of security engines that must mark an entity as malicious or suspicious to set theis_risky property totrue. This condition is validated alongside Google Threat Intelligence verdict information.

IfEngine Allowlist contains values, only results from those specific engines are counted.

If no value is provided, the action ignores engine count calculations.

Engine Percentage Threshold

Optional.

The minimum percentage of security engines that must mark an entity as malicious or suspicious to set theis_risky property totrue (0 and100).

IfEngine Allowlist contains values, the percentage is calculated only from those specific engines.

If bothEngine Threshold andEngine Percentage Threshold are provided,Engine Threshold takes precedence.

If no value is provided, the action ignores percentage calculations.

Engine Allowlist

Optional.

A comma-separated list of security engines to use when determining maliciousness (for example,AlienVault,Kaspersky).

Engines that don't return information about an entity are excluded fromEngine Threshold andEngine Percentage Threshold calculations.

If no value is provided, the action retrieves results from every available engine.

External URLs

Optional.

A comma-separated list of public URLs for the files to submit. If both "External URL" and "File Paths" are provided, the action will collect files from both inputs.

File Paths

Optional.

A comma-separated list of absolute file paths. If you configure the **Linux Server Address** parameter, the action attempts to retrieve the file from a remote server. If both "External URL" and "File Paths" are provided, the action will collect files from both inputs.

Check Hash First

Optional. Default: Disabled.

If enabled, action will first calculate the hashes for the files and search, if there is any available information for it. If available, it will return the information without the submission flow.

Resubmit After (Days)

Optional.

The number of days for the action to wait before resubmitting the file (even if the hash is available for the file in the GTI database).

You must enableCheck Hash First to use this parameter.

The default value is30.

Fetch MITRE Details

Optional.

If selected, the action returns the information about the related MITRE techniques and tactics.

Not selected by default.

Lowest MITRE Technique Severity

Optional.

The lowest MITRE technique severity to return.

The action treats theUnknown severity asInfo.

This parameter only supports the Hash entity.

The default value isLow.

Private Submission

Optional.

If selected, the action submits the file in a private mode.

To submit files privately, the VirusTotal Premium API is required.

Retrieve Comments

Optional.

If selected, the action retrieves comments about the submitted file.

Max Comments To Return

Optional.

The maximum number of comments to return in every action run.

Linux Server Address

Optional.

The IP address of the remote Linux server where the file is located.

Linux Username

Optional.

The username of the remote Linux server where the file is located.

Linux Password

Optional.

The password of the remote Linux server where the file is located.

ZIP Password

Optional.

A password for the zipped folder that contains the files to submit.

Retrieve AI Summary

Optional.

If selected, the action retrieves an AI summary for the submitted file.

The AI summary is available for private submissions only.

This parameter is experimental.

Not selected by default.

Action outputs

TheSubmit File action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkAvailable
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script result.Available
Case wall link

TheSubmit File action can return the following link:

Report LinkPATH:URL

JSON result

The following example shows the JSON result output received when using theSubmit File action:

{"data":{"attributes":{"categories":{"Dr.Web":"known infection source/not recommended site","Forcepoint ThreatSeeker":"compromised websites","sophos":"malware repository, spyware and malware"},"first_submission_date":1582300443,"html_meta":{},"last_analysis_date":1599853405,"last_analysis_results":{"ADMINUSLabs":{"category":"harmless","engine_name":"ADMINUSLabs","method":"blacklist","result":"clean"},"AegisLab WebGuard":{"category":"harmless","engine_name":"AegisLab WebGuard","method":"blacklist","result":"clean"},},"last_analysis_stats":{"harmless":64,"malicious":6,"suspicious":1,"timeout":0,"undetected":8},"last_final_url":"http://192.0.2.15/input/?mark=20200207-example.com/31mawe&tpl=ID&engkey=bar+chart+click+event","last_http_response_code":404,"last_http_response_content_length":204,"last_http_response_content_sha256":"HASH_VALUE","last_http_response_headers":{"connection":"keep-alive","content-length":"204","content-type":"text/html; charset=iso-8859-1","date":"Fri, 11 Sep 2020 19:51:50 GMT","keep-alive":"timeout=60","server":"nginx"},"last_modification_date":1599853921,"last_submission_date":1599853405,"reputation":0,"tags":["ip"],"targeted_brand":{},"threat_names":["Mal/HTMLGen-A"],"times_submitted":3,"title":"404 Not Found","total_votes":{"harmless":0,"malicious":0},"trackers":{},"url":"http://192.0.2.15/input/?mark=20200207-example.com/31mawe&tpl=ID&engkey=bar+chart+click+event"},"id":"ID","links":{"self":"https://www.virustotal.com/api/v3/urls/ID"},"type":"url","comments":["text":"attributes/text","date":"attributes/date"]}"is_risky":true,"related_mitre_techniques":[{"id":"T1071","name":"","severity":""}],"related_mitre_tactics":[{"id":"TA0011","name":""}],"generated_ai_summary":"summary_text_here…"}
Output messages

TheSubmit File action can return the following output messages:

Output messageMessage description

Successfully returned details about the following files using Google Threat Intelligence:PATHS.

The action wasn't able to return details about the following files using Google Threat Intelligence:PATHS.

The action wasn't able to find the following files:PATHS.

The action didn't retrieve any details about the files or none of the files were found.

The action is waiting for results for the following files:PATHS.

The action failed to fetch an AI summary for the following files:PATHS. To generate AI summary, check for sufficient permissions and try again.

The action succeeded.
Error executing action "Submit File". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Error executing action "Submit File". Reason:ERROR_REASON

No "File Paths" or "External URLs" values

At least one of "File Paths" or "External URLs" parameters should have a value.

Script result

The following table lists the value for the script result output when usingtheSubmit File action:

Script result nameValue
is_successTrue orFalse

Update ASM Issue

Use theUpdate ASM Issue action to update an ASM issue inGoogle Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheUpdate ASM Issue action requires the following parameters:

ParameterDescription
Issue ID

Required.

The ID of the issue to update.

Status

Required.

The new status to set for the issue.

The possible values are as follows:

  • Select One
  • New
  • Triaged
  • In Progress
  • Resolved
  • Duplicate
  • Out Of Scope
  • Not A Security Issue (Benign)
  • Risk Accepted
  • False Positive
  • Unable To Reproduce
  • Tracked Externally
  • Mitigated

The default value isSelect One. If you use the default value, the action fails.

Action outputs

TheUpdate ASM Issue action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theUpdate ASM Issue action:

{"success":true,"message":"Successfully reported status as open_new","result":"open_new"}
Output messages

TheUpdate ASM Issue action can return the following output messages:

Output messageMessage description
Successfully updated issue with ID "ISSUE_ID" in Google Threat Intelligence.The action succeeded.
Error executing action "Update ASM Issue". Reason:ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheUpdate ASM Issue action:

Script result nameValue
is_successTrue orFalse

Update DTM Alert

Use theUpdate DTM Alert action to update a Mandiant Digital ThreatMonitoring alert in Google Threat Intelligence.

This action doesn't run on Google SecOps entities.

Action inputs

TheUpdate DTM Alert action requires the following parameters:

ParametersDescription
Alert ID

Required.

The ID of the alert to update.

Status

Optional.

The new status to set for the alert.

The possible values are as follows:

  • Select One
  • New
  • Read
  • Resolved
  • Escalated
  • In Progress
  • No Action Required
  • Duplicate
  • Not Relevant
  • Tracked Externally

The default value isSelect One. If you use the default value, the action fails.

Action outputs

TheUpdate DTM Alert action provides the following outputs:

Action output typeAvailability
Case wall attachmentNot available
Case wall linkNot available
Case wall tableNot available
Enrichment tableNot available
JSON resultAvailable
Output messagesAvailable
Script resultAvailable
JSON result

The following example shows the JSON result output received when using theUpdate DTM Alert action:

{"id":"ID","monitor_id":"MONITOR_ID","topic_matches":[{"topic_id":"4a6ffb0f-e90d-46ce-b10a-3a1e24fbe70d","value":"ap-southeast-1.example.com","term":"lwd","offsets":[26,29]},{"topic_id":"doc_type:domain_discovery","value":"domain_discovery"}],"label_matches":[],"doc_matches":[],"tags":[],"created_at":"2024-05-31T12:27:43.475Z","updated_at":"2024-05-31T12:43:20.399Z","labels_url":"https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ID/labels","topics_url":"https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ID/topics","doc_url":"https://api.intelligence.mandiant.com/v4/dtm/docs/domain_discovery/ID","status":"closed","alert_type":"Domain Discovery","alert_summary":"See alert content for details","title":"Suspicious domain \"ap-southeast-1.example.com\" similar to \"lwd\"","email_sent_at":"","severity":"medium","confidence":0.5,"has_analysis":false,"monitor_version":2}
Output messages

TheUpdate DTM Alert action can return the following output messages:

Output messageMessage description
Successfully updated alert with IDINCIDENT_ID in Google Threat Monitoring.Action succeeded.
Error executing action "Update DTM Alert". Reason:ERROR_REASON

Action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when usingtheUpdate DTM Alert action:

Script result nameValue
is_successTrue orFalse

Connectors

To learn more about configuring connectors in Google SecOps,seeIngest your data (connectors).Note: To prevent data loss, connectors utilizeEvent Flattening. If a raw alert contains a list of entities (such as multiple email addresses, hostnames, or IP addresses), connectors automatically flatten them into separate, unique events.

For example, a single raw alert containing three different email addresses is ingested as three separate events, each containing one distinct email address.

This process ensures that every entity is correctly indexed as a unique asset, making it fully searchable and actionable in playbooks.

Google Threat Intelligence - DTM Alerts Connector

Use theGoogle Threat Intelligence - DTM Alerts Connector to retrieve alertsfrom Google Threat Intelligence. To work with a dynamic list, use thealert_type parameter.

Connector inputs

TheGoogle Threat Intelligence - DTM Alerts Connector requires the followingparameters:

ParameterDescription
Product Field Name

Required.

The name of the field where the product name is stored.

The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.

The default value isProduct Name.

Event Field Name

Required.

The name of the field that determines the event name (subtype).

The default value isevent_type.

Environment Field Name

Optional.

The name of the field where the environment name is stored.

If theenvironment field is missing, the connector uses the default value.

The default value is"".

Environment Regex Pattern

Optional.

A regular expression pattern to run on the value found in theEnvironment Field Name field. This parameter lets you manipulate the environment field using the regular expression logic.

Use the default value.* to retrieve the required rawEnvironment Field Name value.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout

Required.

The timeout limit, in seconds, for the Python process that runs thecurrent script.

The default value is180.

API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value ishttps://www.virustotal.com.

API Key

Required.

The Google Threat Intelligence API key.

Lowest Severity To Fetch

Optional.

The lowest severity of the alerts to retrieve.

If you don'tconfigure this parameter, the connector ingests alerts with all severity levels.

The possible values are as follows:

  • Low
  • Medium
  • High
Monitor ID Filter

Optional.

A comma-separated list of monitor IDs to retrieve the alerts.

Monitor Name Filter

Optional.

A comma-separated list of monitor names from which to retrieve alerts.

If multiple monitors share the same name, the connector ingests from all of them.

This parameter is evaluated alongside Monitor ID values using OR logic.

Event Type Filter

Optional.

A comma-separated list of event types to return.

The input is case insensitive. If no value is provided, the connector processes all event types.

To exclude a specific type, prefix it with an exclamation mark (such as,!event_type).

Disable Overflow

Optional.

If selected, the connector ignores the Google SecOpsoverflow mechanism.

Selected by default.

Max Hours Backwards

Required.

The number of hours prior to now to retrieve alerts.

This parameter can apply to the initial connector iteration after you enablethe connector for the first time, or the fallback value for an expired connectortimestamp.

The default value is1.

Max Alerts To Fetch

Required.

The number of alerts to process in every connector iteration.

The maximum value is25. The default value is25.

Use dynamic list as a blocklist

Required.

If selected, the connector uses the dynamic list as a blocklist.

Not selected by default.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting tothe Google Threat Intelligence server.

Selected by default.

Proxy Server Address

Optional.

The address of the proxy server to use.

Proxy Username

Optional.

The proxy username to authenticate with.

Proxy Password

Optional.

The proxy password to authenticate with.

Connector rules

TheGoogle Threat Intelligence - DTM Alerts Connector supports proxies.

Connector events

There are two types of events for theGoogle Threat Intelligence - DTM AlertsConnector: an event that is based on the main alert and an event that is basedon a topic.

An example of the connector event based on the main alert is as follows:

{"id":"ID","event_type":"Main Alert","monitor_id":"MONITOR_ID","doc":{"__id":"6ed37932-b74e-4253-aa69-3eb4b00d0ea2","__type":"account_discovery","ingested":"2024-05-20T16:15:53Z","service_account":{"login":"user@example.com","password":{"plain_text":"********"},"profile":{"contact":{"email":"user@example.com","email_domain":"example.com"}},"service":{"inet_location":{"domain":"www.example-service.com","path":"/signin/app","protocol":"https","url":"https://www.example-service.com/signin/app"},"name":"www.example-service.com"}},"source":"ccmp","source_file":{"filename":"urlloginpass ap.txt","hashes":{"md5":"c401baa01fbe311753b26334b559d945","sha1":"bf700f18b6ab562afb6128b42a34ae088f9c7434","sha256":"5e6302d95a7e7edb28d68926cede0c44babded720ad1cc9a72c12d8c6d66153f"},"size":84161521407},"source_url":"https://example.com","timestamp":"2023-11-14T20:09:04Z"},"labels":"Label","topic_matches":[{"topic_id":"doc_type:account_discovery","value":"account_discovery"}],"label_matches":[],"doc_matches":[{"match_path":"service_account.profile.contact.email_domain","locations":[{"offsets":[0,9],"value":"example.com"}]}],"tags":[],"created_at":"2024-05-20T16:16:52.439Z","updated_at":"2024-05-30T12:10:56.691Z","labels_url":"https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ID/labels","topics_url":"https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ID/topics","doc_url":"https://api.intelligence.mandiant.com/v4/dtm/docs/account_discovery/ID","status":"read","alert_type":"Compromised Credentials","alert_summary":"ccmp","title":"Leaked Credentials found for domain \"example.com\"","email_sent_at":"","indicator_mscore":60,"severity":"high","confidence":0.9999995147741939,"aggregated_under_id":"ID","monitor_name":"Compromised Credentials - Example","has_analysis":false,"meets_password_policy":"policy_unset","monitor_version":1}

An example of the connector event based on a topic is as follows:

{"id":"ID","event_type":"location_name","location_name":"LOCATION_NAME","timestamp":"2024-05-25T10:56:17.201Z","type":"location_name","value":"LOCATION_NAME","extractor":"analysis-pipeline.nerprocessor-nerenglish-gpu","extractor_version":"4-0-2","confidence":100,"entity_locations":[{"element_path":"body","offsets":[227,229]}]}

Google Threat Intelligence - ASM Issues Connector

Use theGoogle Threat Intelligence - ASM Issues Connector to retrieveinformation about the ASM issues from Google Threat Intelligence. Towork with the dynamic list filter, use thecategory parameter.

Connector inputs

TheGoogle Threat Intelligence - ASM Issues Connector requires the followingparameters:

ParameterDescription
Product Field Name

Required.

The name of the field where the product name is stored.

The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.

The default value isProduct Name.

Event Field Name

Required.

The name of the field that determines the event name (subtype).

The default value isentity_type.

Environment Field Name

Optional.

The name of the field where the environment name is stored.

If theenvironment field is missing, the connector uses the default value.

The default value is"".

Environment Regex Pattern

Optional.

A regular expression pattern to run on the value found in theEnvironment Field Name field. This parameter lets you manipulate the environment field using the regular expression logic.

Use the default value.* to retrieve the required rawEnvironment Field Name value.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout

Required.

The timeout limit, in seconds, for the Python process that runs thecurrent script.

The default value is180.

API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value ishttps://www.virustotal.com.

API Key

Required.

The Google Threat Intelligence API key.

Project Name

Optional.

The name of the ASM project.

If you don't set a value, only alerts from collections in the primary project are returned.

Lowest Severity To Fetch

Optional.

The lowest severity of the alerts to retrieve.

If you don'tconfigure this parameter, the connector ingests alerts with all severity levels.

The possible values are as follows:

  • Critical
  • High
  • Medium
  • Low
  • Informational
Issue Name Filter

Optional.

A comma-separated list of issues to ingest.

The input is case sensitive. If names are listed directly, the connector uses an inclusion filter, ingesting only those matching issues.

To exclude specific issues, prefix the name with an exclamation mark (such as,!issue_name).

If no value is provided, the filter isn't applied, and all issues are ingested.

Status Filter

Optional.

A comma-separated list of issue statuses to ingest.

If no value is provided, the connector only processes open issues.

The possible values are as follows:

  • Open
  • Closed

The default value isOpen.

Event Type Filter

Optional.

A comma-separated list of event types to return.

The input is case insensitive. If no value is provided, the connector processes all event types.

To exclude a specific type, prefix it with an exclamation mark (such as,!event_type).

Max Hours Backwards

Required.

The number of hours prior to now to retrieve alerts.

This parameter can apply to the initial connector iteration after you enablethe connector for the first time, or the fallback value for an expired connectortimestamp.

The default value is1.

Max Issues To Fetch

Required.

The number of issues to process in every connector iteration.

The maximum value is100. The default value is10.

Disable Overflow

Optional.

If selected, the connector ignores the Google SecOpsoverflow mechanism.

Selected by default.

Use dynamic list as a blocklist

Required.

If selected, the connector uses the dynamic list as a blocklist.

Not selected by default.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting tothe Google Threat Intelligence server.

Selected by default.

Proxy Server Address

Optional.

The address of the proxy server to use.

Proxy Username

Optional.

The proxy username to authenticate with.

Proxy Password

Optional.

The proxy password to authenticate with.

Connector events

The example of theGoogle Threat Intelligence - ASM Issues Connector eventis as follows:

{"uuid":"UUID","dynamic_id":25590288,"entity_uid":"9bae9d6f931c5405ad95f0a51954cf8f7193664f0808aadc41c8b25e08eb9bc3","alias_group":null,"category":"vulnerability","confidence":"confirmed","description":"A crafted request uri-path can cause mod_proxy to forward the request to an origin server chosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.","details":{"added":"2021-10-15","proof":"The following resolver IP Address: 203.0.113.132:50408 invoked a DNS Lookup with the following data <empty> at 2023-02-03T03:41:48Z using the UUID associated with this entity.","status":"confirmed","severity":1,"references":[{"uri":"https://example.com/vuln/detail/CVE-2021-40438","type":"description"},{"uri":"https://httpd.example.org/security/vulnerabilities_24.html","type":"description"},{"uri":"https://example.com/cve-2021-40438","type":"description"}],"remediation":null},"first_seen":"2022-11-28T03:24:48.000Z","identifiers":[{"name":"CVE-2021-40438","type":"CVE"}],"last_seen":"2023-02-03T03:41:48.000Z","name":"cve_2021_40438","pretty_name":"Apache HTTP Server Side Request Forgery (CVE-2021-40438)","scoped":true,"severity":1,"source":null,"status":"open_in_progress","ticket_list":null,"type":"standard","uid":"UID","upstream":"intrigue","created_at":"2022-11-28T03:34:31.124Z","updated_at":"2023-02-03T04:03:44.126Z","entity_id":298912419,"collection_id":117139,"collection":"example_oum28bu","collection_type":"user_collection","collection_uuid":"511311a6-6ff4-4933-8f5b-f1f7df2f6a3e","organization_uuid":"21d2d125-d398-4bcb-bae1-11aee14adcaf","entity_name":"http://192.0.2.73:80","entity_type":"Intrigue::Entity::Uri","Intrigue::Entity::Uri":"http://192.0.2.73:80","summary":{"pretty_name":"Apache HTTP Server Side Request Forgery (CVE-2021-40438)","severity":1,"scoped":true,"confidence":"confirmed","status":"open_in_progress","category":"vulnerability","identifiers":[{"name":"CVE-2021-40438","type":"CVE""CVE":"CVE-2021-40438"}],"status_new":"open","status_new_detailed":"in_progress","ticket_list":null},"tags":[]}

Google Threat Intelligence - Livehunt Connector

Use theGoogle Threat Intelligence - Livehunt Connector to retrieveinformation about the Livehunt notifications and their related files fromGoogle Threat Intelligence. To work with the dynamic list, use therule_name parameter.

Connector inputs

TheGoogle Threat Intelligence - Livehunt Connector requires the followingparameters:

ParameterDescription
Product Field Name

Required.

The name of the field where the product name is stored.

The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.

The default value isProduct Name.

Event Field Name

Required.

The name of the field that determines the event name (subtype).

The default value istype.

Environment Field Name

Optional.

The name of the field where the environment name is stored.

If theenvironment field is missing, the connector uses the default value.

The default value is"".

Environment Regex Pattern

Optional.

A regular expression pattern to run on the value found in theEnvironment Field Name field. This parameter lets you manipulate the environment field using the regular expression logic.

Use the default value.* to retrieve the required rawEnvironment Field Name value.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout

Required.

The timeout limit, in seconds, for the Python process that runs thecurrent script.

The default value is180.

API Root

Required.

The API root of the Google Threat Intelligence instance.

The default value ishttps://www.virustotal.com.

API Key

Required.

The Google Threat Intelligence API key.

Max Hours Backwards

Required.

The number of hours prior to now to retrieve alerts.

This parameter can apply to the initial connector iteration after you enablethe connector for the first time, or the fallback value for an expired connectortimestamp.

The default value is1.

Max Notifications To Fetch

Required.

The number of notifications to process in every connector iteration.

The default value is40.

Disable Overflow

Optional.

If selected, the connector ignores the Google SecOpsoverflow mechanism.

Selected by default.

Use dynamic list as a blocklist

Required.

If selected, the connector uses the dynamic list as a blocklist.

Not selected by default.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting tothe Google Threat Intelligence server.

Selected by default.

Proxy Server Address

Optional.

The address of the proxy server to use.

Proxy Username

Optional.

The proxy username to authenticate with.

Proxy Password

Optional.

The proxy password to authenticate with.

Connector rules

TheGoogle Threat Intelligence - Livehunt Connector supports proxies.

Connector events

The example of theGoogle Threat Intelligence - Livehunt Connector eventis as follows:

{"attributes":{"type_description":"Win32 DLL","tlsh":"T1E6A25B41AF6020B3EAF508F135F6D913A930B7110AA4C957774B86511FB4BC3BE7AA2D","vhash":"124056651d15155bzevz36z1",<!CONTENTOMITTED>"last_analysis_date":1645620534,"unique_sources":8,"first_submission_date":1562871116,"sha1":"3de080d32b14a88a5e411a52d7b43ff261b2bf5e","ssdeep":"384:wBvtsqUFEjxcAfJ55oTiwO5xOJuqn2F9BITqGBRnYPLxDG4y8jm+:e1YOcAfGnOmJuqn2LBITqGfWDG4yR+","md5":"6a796088cd3d1b1d6590364b9372959d","magic":"PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit","last_analysis_stats":{"harmless":0,"type-unsupported":5,"suspicious":0,"confirmed-timeout":0,"timeout":14,"failure":4,"malicious":0,"undetected":49},"reputation":0,"first_seen_itw_date":1536433291},"type":"file","id":"ID","links":{"self":"https://www.virustotal.com/api/v3/files/ID"},"context_attributes":{"notification_id":"6425310189355008-7339e39660589ca2ec996c1c15ca5989-ID-1645620534","notification_source_key":"KEY","notification_tags":["cve_pattern","ID","cverules"],"ruleset_name":"cverules","notification_source_country":"KR","rule_name":"cve_pattern","notification_snippet":"","ruleset_id":"6425310189355008","rule_tags":[],"notification_date":1645620832,"match_in_subfile":false}}

Need more help?Get answers from Community members and Google SecOps professionals.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-18 UTC.