Skip to main content

Google Threat Intelligence Threat Lists

This Integration is part of the GoogleThreatIntelligence Pack.#

Supported versions

Supported Cortex XSOAR versions: 5.5.0 and later.

Use this feed integration to fetch Google Threat Intelligence Threat Lists matches as indicators. It processes the latest finished job retrieving its matches based on the limit parameter (10 by default) in every fetch until there are no more matches for that job.

Configure Google Threat Intelligence Threat Lists on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.
  2. Search for Google Threat Intelligence Threat Lists.
  3. Click Add instance to create and configure a new integration instance.
ParameterDescriptionRequired
feedThe fetch indicators.False
credentialsAPI Key.True
feed_typeFeed type.True
filterFilter your Threat Lists (e.g., "gti_score:70+ positives:10- has:campaigns"). Leave empty to receive all.False
limitThe maximum number of results to return. Default is 10.False
feedReputationThe indicator reputation.False
feedReliabilityThe source's reliability.True
tlp_colorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed. More information about the protocol can be found at https://us-cert.cisa.gov/tlpFalse
feedExpirationPolicyThe feed's expiration policy.False
feedFetchIntervalThe feed fetch interval.False
feedBypassExclusionListWhether to bypass exclusion list.False
  1. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

gti-threatlists-get-indicators#


Gets the matches from Google Threat Intelligence Threat Lists.

Base Command#

gti-threatlists-get-indicators

Input#

Argument NameDescriptionRequired
feed_typeFeed type.Required
packagePackage in '%Y%m%d%H' format. If not given, the latest package is taken.Optional
filterFilter your Threat Lists (e.g., "gti_score:70+ positives:10- has:campaigns"). Leave empty to receive all.Optional
limitThe maximum number of results to return. Default is 10.Optional

Context Output#

There is no context output for this command.

Command Example#

!gti-threatlists-get-indicators !gti-threatlists-get-indicators feed=malware package=2025021910 filter="gti_score:70+" limit=10

Human Readable Output#

Indicators from Google Threat Intelligence Threat Lists:#

IdDetectionsGti Threat ScoreGti SeverityGti VerdictMalware FamiliesThreat Actors
f221425286c9073cbb2168f73120b6...59/6980SEVERITY_LOWVERDICT_MALICIOUSbeaconSWEED