Google Threat Intelligence - DTM Alerts
This Integration is part of the GoogleThreatIntelligence Pack.#
Supported versions
Supported Cortex XSOAR versions: 6.10.0 and later.
Google Threat Intelligence - DTM Alerts#
This integration allows the creation of incidents based on DTM Alerts from Google Threat Intelligence.
Configure Google Threat Intelligence - DTM Alerts in Cortex#
| Parameter | Description | Required |
|---|---|---|
| API Key | See Acquiring your API key | True |
| Fetch incidents | False | |
| Max Fetch | Maximum number of Alerts to fetch each time. Maximum value is 25. | False |
| First Fetch Time | The date or relative timestamp from which to begin fetching Alerts. Supported formats: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ. For example: 01 May 2025, 01 May 2025 04:45:33, 2025-05-17T14:05:44Z. | False |
| Mirroring Direction | The mirroring direction in which to mirror the details. You can mirror "Outgoing" (from XSOAR to GTI) direction for DTM Alerts. | False |
| Alert Type | Fetch Alerts by the specified alert types. | False |
| Alert Monitor ID | Fetch Alerts by the specified monitor IDs. | False |
| Alert Status | Fetch Alerts by the specified status. | False |
| Alert Severity | Fetch Alerts by the specified severity. | False |
| Alert Tags | Fetch Alerts by the specified tags. | False |
| Alert Match Value | Fetch Alerts by specified match value. | False |
| Alert mscore | Fetch Alerts with mscore greater than or equal to the given value. Note: Valid range is 0 to 100. | False |
| Alert Search | Search Alerts and triggering documents using a Lucene query with text values joined by AND/OR. | False |
| Use system proxy settings | False | |
| Trust any certificate (not secure) | False |
Acquiring your API key#
Your API key can be found in your GoogleThreatIntelligence account user menu, clicking on your avatar:

Your API key carries all your privileges, so keep it secure and don't share it with anyone.
Commands#
You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
gti-dtm-alert-list#
Search the DTM Alerts with provided filter arguments.
Base Command#
gti-dtm-alert-list
Input#
| Argument Name | Description | Required |
|---|---|---|
| start_time | Start time of the time range to list alerts. Supported formats: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ. For example: 01 May 2025, 01 Mar 2025 04:45:33, 2025-04-17T14:05:44Z. | Optional |
| end_time | End time of the time range to list alerts. Supported formats: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ. For example: 01 May 2025, 01 Mar 2025 04:45:33, 2025-04-17T14:05:44Z. | Optional |
| order | Filter alerts by the provided sort order. Possible values are: Asc, Desc. Default is Desc. | Optional |
| sort | Filter alerts by the provided sort field. Possible values are: Created At, Updated At, Monitor ID, ID. Default is Created At. | Optional |
| page_size | Specify the desired page size for the request. Maximum value is 25. Default is 10. | Optional |
| monitor_id | Filter alerts by monitor IDs. Supports comma-separated values. | Optional |
| alert_type | Filters alerts by their alert type. Supports comma-separated values. Possible values are: Compromised Credentials, Domain Discovery, Forum Post, Message, Paste, Shop Listing, Tweet, Web Content. | Optional |
| tags | Filter alerts by tags value. Supports comma-separated values. | Optional |
| status | Filter alerts by the provided status. Supports comma-separated values. Possible values are: New, Read, In Progress, Escalated, Closed, No Action Required, Duplicate, Not Relevant, Tracked External. | Optional |
| severity | Filter alerts by severity. Supports comma-separated values. Possible values are: Low, Medium, High. | Optional |
| mscore_gte | Filter alerts with mscore greater than or equal to the given value. Note: Valid range is 0 to 100. | Optional |
| include_more_details | If yes, doc, labels, and topics are returned in the context data. Possible values are: Yes, No. Default is Yes. | Optional |
| include_monitor_name | If yes, then the monitor's name that created the alert is returned in the alert response body. Possible values are: Yes, No. Default is No. | Optional |
| has_analysis | If yes, then only alerts that have analysis are returned. An alert has analysis if it has either analysis text or analysis file attachments. Possible values are: Yes, No. | Optional |
| search | Filter alert and triggering document contents using a simple Lucene query string with one or more text values separated by AND or OR. | Optional |
| match_value | Filter alerts by the given match value. Supports comma-separated values. | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| GoogleThreatIntelligenceDTMAlerts.Alerts.id | String | Unique identifier for the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.monitor_id | String | Identifier of the monitoring source that generated the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.__id | String | Unique document ID associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.__type | String | Type of document associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.body | String | Full content or message body of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_id | String | ID of the channel where the alert was observed. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_info.description | String | Description of the channel where the alert was detected. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_url | String | URL of the detected channel. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.invite_url | String | Invite link of the detected channel, if available. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.messenger.id | String | Identifier of the messenger platform linked to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.messenger.name | String | Name of the messenger platform. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.name | String | Name of the channel where the content was found. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.ingested | Date | Date and time when the document was ingested into the system. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.message_id | String | Identifier of the specific message triggering the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.messenger.id | String | Messenger platform ID associated with the message. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.messenger.name | String | Name of the messenger platform associated with the message. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.avatar_file.hashes.sha256 | String | SHA-256 hash of the sender's avatar file. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.avatar_file.mime_type | String | MIME type of the sender's avatar file. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.first_name | String | First name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.last_name | String | Last name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.name | String | Full name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.telegram.name | String | Telegram username of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.telegram.user_id | Number | Telegram user ID of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.source | String | Source of the document or content triggering the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.timestamp | Date | Timestamp when the message or document was created. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.id | String | Unique identifier of the label assigned to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.classifier | String | Classifier name used for label assignment. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.version | String | Version of the classifier or labeling process. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.label | String | Name of the label assigned to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.confidence | Number | Confidence score of the assigned label. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.element_path | String | Path of the element where the label was applied. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.id | String | Unique identifier of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.type | String | Type of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.value | String | Value of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.extractor | String | Name of the topic extraction tool. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.extractor_version | String | Version of the topic extractor used. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.entity_locations.element_path | String | Path of the element where the entity was detected. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.entity_locations.offsets | Number | Character offsets of the detected entity in the document. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topic_matches.topic_id | String | Identifier of the matched topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topic_matches.value | String | Matched value for the topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.label_matches | List | List of labels matched for the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.match_path | String | Path within the document where a match occurred. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.locations.offsets | Number | Offset positions of the document match. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.locations.value | String | Value of the matched document content. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.tags | List | Tags associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.created_at | Date | Date and time when the alert was created. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.updated_at | Date | Date and time when the alert was last updated. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels_url | String | URL to fetch labels associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics_url | String | URL to fetch topics associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_url | String | URL of the original document related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.status | String | Current status of the alert (e.g., open, closed, triaged). |
| GoogleThreatIntelligenceDTMAlerts.Alerts.alert_type | String | Type or category of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.alert_summary | String | Summary of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.title | String | Title of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.email_sent_at | String | Timestamp when the alert email was sent. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.indicator_mscore | Number | Malicious score of the indicator related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.severity | String | Severity level of the alert (e.g., low, medium, high). |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence | Number | Confidence score of the alert detection. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.aggregated_under_id | String | ID under which the alert has been aggregated. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.monitor_name | String | Name of the monitoring source that generated the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.analysis | String | Analysis report or details associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.has_analysis | Boolean | Indicates whether the alert has an associated analysis. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.ai_doc_summary | String | AI-generated summary of the document related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.similarity_score | Number | Similarity score between this alert and related alerts. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.severity_reasoning.rule | String | Rule used to determine the severity of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.version | String | Version of the confidence reasoning model. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.response_count | Number | Number of responses contributing to confidence reasoning. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.malicious_count | Number | Number of malicious detections contributing to confidence. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.benign_count | Number | Number of benign detections contributing to confidence. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.confidence_count | Number | Total number of samples considered for confidence calculation. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.explanation | String | Explanation behind the confidence score. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.ignore | Boolean | Indicates if the alert should be ignored. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.monitor_version | Number | Version of the monitoring source generating the alert. |
Command example#
!gti-dtm-alert-list alert_type=Message include_monitor_name=Yes include_more_details=Yes mscore_gte=11 order=Desc page_size=2 search=social severity=Low sort="Created At" tags=attempt
Context Example#
Human Readable Output#
DTM Alerts#
Alert ID Title Alert Summary Alert Type Severity Status Monitor ID Monitor Name Indicator Score Created At Updated At Tags dummy_0000 Found topic "google" posted by actor "sevenbump" on channel "social" This message advertises a service that provides fraudulent Google verification badges for any account. Message Low Read dummy_monitor_id Initial Access Broker 11 2025-05-21T11:28:02.646Z 2025-05-22T07:09:51.257Z attempt,
Testdummy_0001 Found topic "Google" posted by actor "sevenbump" on Google channel "social" This message advertises a service that offers unauthorized google account. Message Low Read dummy_monitor_id Initial Access Broker 11 2025-05-21T10:19:04.241Z 2025-05-22T07:09:51.257Z attempt
gti-dtm-alert-get#
Get a particular DTM Alert by ID.
Base Command#
gti-dtm-alert-get
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | Specify ID of the alert. Note: Use gti-dtm-alert-list to retrive the Alert ID. | Required |
| include_more_details | If yes, doc, labels, and topics are returned in the context data. Possible values are: Yes, No. Default is Yes. | Optional |
| sanitize | If yes, any HTML content in the alert is sanitized to ensure it does not contain malicious tags. Possible values are: Yes, No. | Optional |
| truncate | Specify whether to truncate document fields to the given length. Note: A Unicode ellipsis (\x2026) is used to indicate truncation. | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| GoogleThreatIntelligenceDTMAlerts.Alerts.id | String | Unique identifier for the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.monitor_id | String | Identifier of the monitoring source that generated the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.__id | String | Unique document ID associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.__type | String | Type of document associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.body | String | Full content or message body of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_id | String | ID of the channel where the alert was observed. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_info.description | String | Description of the channel where the alert was detected. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_url | String | URL of the detected channel. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.invite_url | String | Invite link of the detected channel, if available. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.messenger.id | String | Identifier of the messenger platform linked to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.messenger.name | String | Name of the messenger platform. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.name | String | Name of the channel where the content was found. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.ingested | Date | Date and time when the document was ingested into the system. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.message_id | String | Identifier of the specific message triggering the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.messenger.id | String | Messenger platform ID associated with the message. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.messenger.name | String | Name of the messenger platform associated with the message. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.avatar_file.hashes.sha256 | String | SHA-256 hash of the sender's avatar file. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.avatar_file.mime_type | String | MIME type of the sender's avatar file. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.first_name | String | First name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.last_name | String | Last name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.name | String | Full name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.telegram.name | String | Telegram username of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.telegram.user_id | Number | Telegram user ID of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.source | String | Source of the document or content triggering the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.timestamp | Date | Timestamp when the message or document was created. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.id | String | Unique identifier of the label assigned to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.classifier | String | Classifier name used for label assignment. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.version | String | Version of the classifier or labeling process. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.label | String | Name of the label assigned to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.confidence | Number | Confidence score of the assigned label. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.element_path | String | Path of the element where the label was applied. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.id | String | Unique identifier of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.type | String | Type of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.value | String | Value of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.extractor | String | Name of the topic extraction tool. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.extractor_version | String | Version of the topic extractor used. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.entity_locations.element_path | String | Path of the element where the entity was detected. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.entity_locations.offsets | Number | Character offsets of the detected entity in the document. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topic_matches.topic_id | String | Identifier of the matched topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topic_matches.value | String | Matched value for the topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.label_matches | List | List of labels matched for the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.match_path | String | Path within the document where a match occurred. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.locations.offsets | Number | Offset positions of the document match. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.locations.value | String | Value of the matched document content. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.tags | List | Tags associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.created_at | Date | Date and time when the alert was created. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.updated_at | Date | Date and time when the alert was last updated. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels_url | String | URL to fetch labels associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics_url | String | URL to fetch topics associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_url | String | URL of the original document related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.status | String | Current status of the alert (e.g., open, closed, triaged). |
| GoogleThreatIntelligenceDTMAlerts.Alerts.alert_type | String | Type or category of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.alert_summary | String | Summary of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.title | String | Title of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.email_sent_at | String | Timestamp when the alert email was sent. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.indicator_mscore | Number | Malicious score of the indicator related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.severity | String | Severity level of the alert (e.g., low, medium, high). |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence | Number | Confidence score of the alert detection. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.aggregated_under_id | String | ID under which the alert has been aggregated. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.has_analysis | Boolean | Indicates whether the alert has an associated analysis. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.ai_doc_summary | String | AI-generated summary of the document related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.similarity_score | Number | Similarity score between this alert and related alerts. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.severity_reasoning.rule | String | Rule used to determine the severity of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.version | String | Version of the confidence reasoning model. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.response_count | Number | Number of responses contributing to confidence reasoning. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.malicious_count | Number | Number of malicious detections contributing to confidence. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.benign_count | Number | Number of benign detections contributing to confidence. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.confidence_count | Number | Total number of samples considered for confidence calculation. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.explanation | String | Explanation behind the confidence score. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.ignore | Boolean | Indicates if the alert should be ignored. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.monitor_version | Number | Version of the monitoring source generating the alert. |
Command example#
!gti-dtm-alert-get alert_id=dummy_alert_001
Context Example#
Human Readable Output#
DTM Alert#
Alert ID Title Alert Summary Alert Type Severity Status Monitor ID Indicator Score Created At Updated At Tags dummy_alert_001 Found topic "google" posted by actor "test" on channel "chasinchicken1" This advertisement details a sophisticated phishing-as-a-service platform verified email spoofing capabilities. Message Medium New dummy_monitor_id_000 92 2025-08-19T09:29:31.827Z 2025-08-19T10:13:25.352Z attempt
gti-dtm-alert-status-update#
Update the status of DTM alert.
Base Command#
gti-dtm-alert-status-update
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | Specify ID of the alert. Note: Use gti-dtm-alert-list to retrive the Alert ID. | Required |
| status | Specify status of the alert. Possible values are: new, read, in_progress, escalated, closed, no_action_required, duplicate, not_relevant, tracked_external. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| GoogleThreatIntelligenceDTMAlerts.Alerts.id | String | Unique identifier for the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.monitor_id | String | Identifier of the monitoring source that generated the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.__id | String | Unique document ID associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.__type | String | Type of document associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.body | String | Full content or message body of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_id | String | ID of the channel where the alert was observed. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_info.description | String | Description of the channel where the alert was detected. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.channel_url | String | URL of the detected channel. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.invite_url | String | Invite link of the detected channel, if available. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.messenger.id | String | Identifier of the messenger platform linked to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.messenger.name | String | Name of the messenger platform. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.channel.name | String | Name of the channel where the content was found. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.ingested | Date | Date and time when the document was ingested into the system. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.message_id | String | Identifier of the specific message triggering the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.messenger.id | String | Messenger platform ID associated with the message. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.messenger.name | String | Name of the messenger platform associated with the message. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.avatar_file.hashes.sha256 | String | SHA-256 hash of the sender's avatar file. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.avatar_file.mime_type | String | MIME type of the sender's avatar file. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.first_name | String | First name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.last_name | String | Last name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.identity.name | String | Full name of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.telegram.name | String | Telegram username of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.sender.telegram.user_id | Number | Telegram user ID of the sender. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.source | String | Source of the document or content triggering the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc.timestamp | Date | Timestamp when the message or document was created. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.id | String | Unique identifier of the label assigned to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.classifier | String | Classifier name used for label assignment. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.version | String | Version of the classifier or labeling process. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.label | String | Name of the label assigned to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.confidence | Number | Confidence score of the assigned label. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels.element_path | String | Path of the element where the label was applied. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.id | String | Unique identifier of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.type | String | Type of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.value | String | Value of the extracted topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.extractor | String | Name of the topic extraction tool. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.extractor_version | String | Version of the topic extractor used. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.entity_locations.element_path | String | Path of the element where the entity was detected. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics.entity_locations.offsets | Number | Character offsets of the detected entity in the document. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topic_matches.topic_id | String | Identifier of the matched topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topic_matches.value | String | Matched value for the topic. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.label_matches | List | List of labels matched for the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.match_path | String | Path within the document where a match occurred. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.locations.offsets | Number | Offset positions of the document match. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_matches.locations.value | String | Value of the matched document content. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.tags | List | Tags associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.created_at | Date | Date and time when the alert was created. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.updated_at | Date | Date and time when the alert was last updated. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.labels_url | String | URL to fetch labels associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.topics_url | String | URL to fetch topics associated with the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.doc_url | String | URL of the original document related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.status | String | Current status of the alert (e.g., open, closed, triaged). |
| GoogleThreatIntelligenceDTMAlerts.Alerts.alert_type | String | Type or category of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.alert_summary | String | Summary of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.title | String | Title of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.email_sent_at | String | Timestamp when the alert email was sent. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.indicator_mscore | Number | Malicious score of the indicator related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.severity | String | Severity level of the alert (e.g., low, medium, high). |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence | Number | Confidence score of the alert detection. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.aggregated_under_id | String | ID under which the alert has been aggregated. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.has_analysis | Boolean | Indicates whether the alert has an associated analysis. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.ai_doc_summary | String | AI-generated summary of the document related to the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.similarity_score | Number | Similarity score between this alert and related alerts. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.severity_reasoning.rule | String | Rule used to determine the severity of the alert. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.version | String | Version of the confidence reasoning model. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.response_count | Number | Number of responses contributing to confidence reasoning. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.malicious_count | Number | Number of malicious detections contributing to confidence. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.benign_count | Number | Number of benign detections contributing to confidence. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.confidence_count | Number | Total number of samples considered for confidence calculation. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.confidence_reasoning.explanation | String | Explanation behind the confidence score. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.ignore | Boolean | Indicates if the alert should be ignored. |
| GoogleThreatIntelligenceDTMAlerts.Alerts.monitor_version | Number | Version of the monitoring source generating the alert. |
Command example#
!gti-dtm-alert-status-update alert_id=dummyalertid_001 status=duplicate
Context Example#
Human Readable Output#
Alert Status Updated Successfully#
Alert ID Status dummy_alert_id_001 Duplicate