Skip to main content

Google Threat Intelligence IoC Stream Feed

This Integration is part of the GoogleThreatIntelligence Pack.#

Supported versions

Supported Cortex XSOAR versions: 5.5.0 and later.

Use the Google Threat Intelligence IoC Stream Feed integration to fetch indicators from IoC Stream rules or rulesets.

Configure Google Threat Intelligence IoC Stream Feed on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.
  2. Search for Google Threat Intelligence IoC Stream Feed.
  3. Click Add instance to create and configure a new integration instance.
ParameterDescriptionRequired
feedThe fetch indicators.False
credentialsAPI Key.True
filterExact name of the rule or ruleset you want to filter on. Leave empty to receive all.False
feedReputationThe indicator reputation.False
feedReliabilityThe source's reliability.True
tlp_colorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed. More information about the protocol can be found at https://us-cert.cisa.gov/tlpFalse
feedExpirationPolicyThe feed's expiration policy.False
feedFetchIntervalThe feed fetch interval.False
feedMinimumGTIScoreThe minimum GTI score to import as part of the feed.True
feedBypassExclusionListWhether to bypass exclusion list.False
  1. Click Test to validate the Google Threat Intelligence API Key, and connection.

IoC Stream Feed info:#

By default the IoC Stream Feed retrieve all indicators on IoC Stream. You have the option to get files, domains, IP addresses or URLs only from LiveHunt, RetroHunt, Collections, Threat Actors, etc., using the filter parameter.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

Get Indicators#


Gets the indicators from Google Threat Intelligence IoC Stream.

Base Command#

gti-iocstream-get-indicators

Input#
Argument NameDescriptionRequired
limitThe maximum number of indicators to return. The default value is 10 and max 40.Optional
filterFilter your IoC Stream (e.g., "source_type:hunting_ruleset" for LiveHunt, "source_type:retrohunt_job" for RetroHunt). Leave empty to receive all.Optional
Context Output#

There is no context output for this command.

Command Example#

!gti-iocstream-get-indicators limit=1 filter=source_type:hunting_ruleset

Human Readable Output#

Indicators from Google Threat Intelligence IoC Stream:#

IdDetectionsOriginSourcesGti Threat ScoreGti SeverityGti VerdictMalware FamiliesThreat Actors
f221425286c9073cbb2168f73120b6...59/69hunting[hunting_ruleset] YARA ruleset80SEVERITY_LOWVERDICT_MALICIOUSbeaconSWEED