Google Threat Intelligence Reports CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
| Current Integration Version | 3.0.0 |
| Compatible with ThreatQ Versions | >= 5.12.1 |
| Support Tier | ThreatQ Supported |
Introduction
The Google Threat Intelligence Reports CDF integration enables the ingestion of curated threat intelligence reports from the Google Threat Intelligence (GTI) API into ThreatQ, replacing the legacy Mandiant Intelligence Reports workflow. This integration provides a modernized and scalable approach to collecting and operationalizing intelligence by leveraging Google’s GTI platform.
The integration provides the following feeds:
- Google Threat Intelligence Reports - ingests GTI report collections and leverages supplemental feeds to retrieve related entities and indicators.
- Google Threat Intelligence Report Details (Supplemental)
- Google Threat Intelligence Report Related Adversaries (Supplemental)
- Google Threat Intelligence Report Related Campaigns (Supplemental)
- Google Threat Intelligence Report Related Attack Patterns (Supplemental)
- Google Threat Intelligence Report Related Malware (Supplemental)
- Google Threat Intelligence Report Related Vulnerabilities (Supplemental)
- Google Threat Intelligence Report Related Indicators (Supplemental)
The integration ingests the following object types:
- Adversaries
- Attack Patterns
- Campaigns
- Indicators
- Malware
- Reports
- Signatures
- Vulnerabilities
Prerequisites
The following is required to run the integration:
- A Google Threat Intelligence API key.
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration yaml file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration yaml file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the file on your local machine
- Select the individual feeds to install, when prompted and click Install.
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
The feed(s) will be added to the integrations page. You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Base URL Specify the base endpoint for the Google Threat Intelligence API. The default is https://www.virustotal.com.API Key Enter your Google Threat Intelligence API key. Origin Filter Filter intelligence results based on origin. Options include: - Google Threat Intelligence (Curated) (default)
- Partner (e.g., AlienVault OTX)
- Crowdsourced (e.g., individual users).
Target Industry Optional- specify a single target industry for filtering intelligence results. Fetch Related Adversaries Enable this parameter to retrieve related adversaries using additional API calls. This parameter is enabled by default. Enabling this feature may significantly increase API usage and can rapidly consume your daily rate limit.
Adversary Context Selection Select the context to bring back with each ingested adversary. Options include: - Motivation (default)
- Target Industry (default)
- Source Region (default)
- Source Sub Region
- Source Country
- Source Country Code
- Target Region (default)
- Target Sub Region
- Target Country
- Target Country Code
- Aliases
This parameter is only accessible if you have enabled the Fetch Related Adversaries parameter.
Fetch Related Campaigns Enable this parameter to retrieve related campaigns via additional API calls. This parameter is enabled by default. Enabling this feature may significantly increase API usage and can rapidly consume your daily rate limit.
Campaign Context Selection Select the context to bring back with each ingested campaign. Options include: - Motivations (default)
- Source Regions Context (default)
- Targeted Regions Context (default)
- Target Sector (default)
- Last Seen (default)
This parameter is only accessible if you have enabled the Fetch Related Campaigns parameter.
Fetch Related Attack Patterns Enable this parameter to retrieve related attack patterns using additional API calls. This parameter is enabled by default. Enabling this feature may significantly increase API usage and can rapidly consume your daily rate limit.
Fetch Related Malware Enable this parameter to retrieve related malware using additional API calls. This parameter is enabled by default. Enabling this feature may significantly increase API usage and can rapidly consume your daily rate limit.
Malware Context Selection Select the context to bring back with each ingested malware. Options include: - Target Operating System (default)
- Target Industry (default)
- Detection (default)
This parameter is only accessible if you have enabled the Fetch Related Malware parameter.
Fetch Related CVEs Enable this parameter to retrieve related CVEs using additional API calls. This parameter is enabled by default. Enabling this feature may significantly increase API usage and can rapidly consume your daily rate limit.
CVE Context Selection Select the context to bring back with each ingested CVE. Options include: - CVSS v2 Vector
- CVSS v2 Scores
- CVSS v3 Vector (default)
- CVSS v3 Scores (default)
- Exploitation Vectors
- EPSS Score (default)
This parameter is only accessible if you have enabled the Fetch Related CVEs parameter.
Ingest CVEs As Select how CVEs are ingested into ThreatQ. Options include Indicators (CVEs) or Vulnerabilities (default). This parameter is only accessible if you have enabled the Fetch Related CVEs parameter.
Fetch Related Indicators Enable this parameter to retrieve related indicators through additional API calls. This parameter is enabled by default. Enabling this feature may significantly increase API usage and can rapidly consume your daily rate limit.
Ingested Indicator Types Select the related indicator types to ingest into ThreatQ. Options include: - IP Address (default)
- FQDN (default)
- URL (default)
- MD5
- SHA-1
- SHA-256 (default)
This parameter is only accessible if you have enabled the Fetch Related Indicators parameter.
Ingest Crowdsourced YARA as Signatures Enable this parameter to ingest crowdsourced_yara_resultsas YARA signatures. This parameter is enabled by default.Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Google Threat Intelligence Reports
The Google Threat Intelligence Reports feed ingests GTI report collections and uses supplemental feeds to fetch related objects and indicators.
GET {base_url}/api/v3/collections?filter=collection_type:report
Sample Response (truncated):
{
"data": [
{
"id": "report--3994189809d809c14ff056f104fe75b920297c22114e2e1c6e11bc6d6b79c9d9",
"type": "collection",
"links": {
"self": "https://www.virustotal.com/api/v3/collections/report--3994189809d809c14ff05
},
"attributes": {
"mitigations": [],
"is_content_translated": false,
"affected_systems": [],
"detection_names": [],
"author": "@TheHackersNews",
"sponsor_region": "KP",
"files_count": 0,
"targeted_informations": [],
"subscribers_count": 0,
"status": "COMPUTED",
"recent_activity_relative_change": 1.2666666666666666,
"capabilities": [],
"targeted_industries": [
"Game",
"Health",
"Finance",
"News - Media",
"Government, Administration",
"IT",
"Automotive",
"Retail",
"Cryptocurrency"
],
"references_count": 0,
"name": "ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farm
"operating_systems": [],
"private": false,
"targeted_regions": [
"AE",
"KW",
"BA",
"US",
"GR",
"ES",
"BH",
"UA",
"QA",
"SI",
"OM",
"SA",
"GB"
],
"report_type": "OSINT Article",
"recent_activity_summary": [
2,
0,
33,
29
],
"source_region": "IR",
"targeted_industries_tree": [
{
"industry_group": "Media & Entertainment",
"industry": "News - Media",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Media & Entertainment",
"industry": "Game",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Retail",
"industry": "Retail",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Telecommunications",
"industry": "IT",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Government",
"industry": "Government, Administration",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Automotive",
"industry": "Automotive",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Healthcare",
"industry": "Health",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Financial Services",
"industry": "Finance",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"industry_group": "Financial Services",
"industry": "Cryptocurrency",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
}
],
"origin": "Crowdsourced",
"alt_names_details": [],
"ip_addresses_count": 0,
"malware_roles": [
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Backdoor",
"last_seen": null
},
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Keylogger",
"last_seen": null
},
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Downloader",
"last_seen": null
},
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Remote Control and Administration Tool",
"last_seen": null
},
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Ransomware",
"last_seen": null
},
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Backdoor - Webshell",
"last_seen": null
},
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Dropper",
"last_seen": null
},
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Credential Stealer",
"last_seen": null
}
],
"executive_summary": "ThreatsDay Bulletin: active exploits, supply chain attacks, AI
"tags_details": [],
"threat_scape": [],
"last_seen_details": [],
"domains_count": 1,
"counters": {
"files": 0,
"domains": 1,
"ip_addresses": 0,
"urls": 1,
"iocs": 2,
"subscribers": 0,
"attack_techniques": 0
},
"urls_count": 1,
"intended_effects": [],
"collection_type": "report",
"creation_date": 1776950220,
"autogenerated_tags": [],
"source_regions_hierarchy": [
{
"region": "Asia",
"sub_region": "Eastern Asia",
"country": "Korea, Democratic People's Republic Of",
"country_iso2": "KP",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"region": "Europe",
"sub_region": "Eastern Europe",
"country": "Russian Federation",
"country_iso2": "RU",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"region": "Europe",
"sub_region": "Eastern Europe",
"country": "Belarus",
"country_iso2": "BY",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
},
{
"region": "Asia",
"sub_region": "Southern Asia",
"country": "Iran, Islamic Republic Of",
"country_iso2": "IR",
"confidence": "crowdsourced",
"first_seen": null,
"last_seen": null,
"description": null,
"source": null
}
],
"motivations": [
{
"description": null,
"first_seen": null,
"confidence": "crowdsourced",
"value": "Hacktivism",
"last_seen": null
}
],
"link": "https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html",
"top_icon_md5": [],
"collection_links": [],
"first_seen_details": [],
"alt_names": [],
"technologies": [],
"tags": [],
"last_modification_date": 1776956101,
"autogenerated_summary": "A $290 million DeFi heist occurred via RPC infrastructure
"publisher": "thehackernews",
"aggregations": {},
"content": "# ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM
},
"context_attributes": {
"snippet": "<b>1</b>. State-backed crypto heist North Korea Likely ... <b>IP</b> rot
"shared_with_me": false,
"role": "viewer"
}
}
]
}
ThreatQuotient provides the following default mapping for this feed based on each item within the .data[] list.
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.attributes.name |
Report.Value |
Report |
.attributes.creation_date |
STX RAT: A new RAT in 2026 with Infostealer Capabilities |
If report_type is Vulnerability Report, the primary object is ingested as a Vulnerability instead of a Report. |
.attributes.link |
Report.Attribute |
Report Link |
.attributes.creation_date |
https://www.hendryadrian.com/stx-rat-a-new-rat-in-2026-with-infostealer-capabilities/ |
N/A |
.attributes.report_type |
Report.Attribute |
Report Type |
.attributes.creation_date |
OSINT Article |
N/A |
.attributes.publisher |
Report.Attribute |
Publisher |
.attributes.creation_date |
hendryadrian |
N/A |
.attributes.author |
Report.Attribute |
Author |
.attributes.creation_date |
Esentire @TweetThreatNews |
N/A |
.attributes.origin |
Report.Attribute |
Origin |
.attributes.creation_date |
Crowdsourced |
N/A |
.attributes.targeted_industries_tree[].industry_group |
Report.Attribute |
Target Industry |
.attributes.creation_date |
Financial Services |
N/A |
.attributes.targeted_regions[] |
Report.Attribute |
Targeted Region |
.attributes.creation_date |
US |
Array value. |
.attributes.operating_systems[].value |
Report.Attribute |
Operating System |
.attributes.creation_date |
Windows |
Array value. |
.attributes.motivations[].value |
Report.Attribute |
Motivation |
.attributes.creation_date |
Financial Gain |
N/A |
.attributes.executive_summary + .attributes.autogenerated_summary + .attributes.content |
Report.Description |
N/A |
N/A |
N/A |
Rendered into HTML in ThreatQ. |
Supplemental related-object API calls are only made when the report indicates related data exists and the corresponding count/counter value is greater than 0.
Google Threat Intelligence Report Related Adversaries (Supplemental)
GET {base_url}/api/v3/collections/{report_id}/threat_actors
Sample Response (truncated:
{ "data": [ { "id": "threat-actor--50cd027f-df14-40b2-aa22-bf5de5061163", "type": "collection", "links": { "self": "https://www.virustotal.com/api/v3/collections/threat-actor--50cd027f-df14-40b2-aa22-bf5de5061163" }, "attributes": { "summary_stats": { "first_submission_date": { "min": 0.0, "max": 1764641939.0, "avg": 1334719380.4161248 }, "last_submission_date": { "min": 0.0, "max": 1776844731.0, "avg": 1386101892.4304292 }, "files_detections": { "min": 0.0, "max": 64.0, "avg": 22.407350689127124 }, "urls_detections": { "min": 0.0, "max": 18.0, "avg": 6.534482758620692 } }, "recent_activity_relative_change": 0.05426716141001853, "targeted_regions_hierarchy": [ { "region": "Asia", "sub_region": "South-eastern Asia", "country": "Vietnam", "country_iso2": "VN", "confidence": "crowdsourced", "first_seen": null, "last_seen": null, "description": null, "source": null } ], "alt_names_details": [ { "last_seen": null, "confidence": "crowdsourced", "description": null, "first_seen": null, "value": "InkySquid" } { "last_seen": null, "confidence": "crowdsourced", "description": null, "first_seen": null, "value": "ScarCruft" }, { "last_seen": null, "confidence": "crowdsourced", "description": null, "first_seen": null, "value": "Group 123" } ], "references_count": 17, "name": "APT37", "top_icon_md5": [ "75a3c799cc431b997f76afc4dd08e479", "0646fde7ac29e4bde70f6e71bc4542d9", "b4225d8d8114854d2cdf3cb647735e73" ], } }
ThreatQuotient provides the following default mapping for this feed based on each item within the .data[] list.
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.attributes.name |
Related Adversary.Value |
Adversary |
.attributes.last_modification_date |
APT28 |
N/A |
.attributes.alt_names_details[].value |
Related Adversary.Tag |
N/A |
N/A |
APT28 (Google) |
User-configurable. |
.attributes.description |
Related Adversary.Description |
N/A |
N/A |
APT28 is a highly active cyber espionage group ... |
N/A |
.attributes.motivations[].value |
Related Adversary.Attribute |
Motivation |
.attributes.last_modification_date |
Espionage |
User-configurable. |
.attributes.targeted_industries_tree[].industry_group |
Related Adversary.Attribute |
Target Industry |
.attributes.last_modification_date |
Aerospace & Defense |
User-configurable. |
.attributes.source_regions_hierarchy[].region |
Related Adversary.Attribute |
Region |
.attributes.last_modification_date |
Europe |
User-configurable. |
.attributes.source_regions_hierarchy[].sub_region |
Related Adversary.Attribute |
Sub Region |
.attributes.last_modification_date |
Eastern Europe |
User-configurable. |
.attributes.source_regions_hierarchy[].country |
Related Adversary.Attribute |
Country |
.attributes.last_modification_date |
Russian Federation |
User-configurable. |
.attributes.source_regions_hierarchy[].country_iso2 |
Related Adversary.Attribute |
Country Code |
.attributes.last_modification_date |
RU |
User-configurable. |
.attributes.targeted_regions_hierarchy[].region |
Related Adversary.Attribute |
Target Region |
.attributes.last_modification_date |
Europe |
User-configurable. |
.attributes.targeted_regions_hierarchy[].sub_region |
Related Adversary.Attribute |
Target Sub Region |
.attributes.last_modification_date |
Western Europe |
User-configurable. |
.attributes.targeted_regions_hierarchy[].country |
Related Adversary.Attribute |
Target Country |
.attributes.last_modification_date |
Austria |
User-configurable. |
.attributes.targeted_regions_hierarchy[].country_iso2 |
Related Adversary.Attribute |
Target Country Code |
.attributes.last_modification_date |
AT |
User-configurable. |
Google Threat Intelligence Report Related Campaigns (Supplemental)
GET {base_url}/api/v3/collections/{report_id}/campaigns
Sample Response:
{ "data": [ { "id": "campaign--06d5db6f-130f-53ed-ac1b-6076e4e4dc7b", "type": "collection", "links": { "self": "https://www.virustotal.com/api/v3/collections/campaign--06d5db6f-130f-53ed-ac1b-6076e4e4dc7b" }, "attributes": { "alt_names_details": [ { "first_seen": null, "confidence": "confirmed", "last_seen": null, "description": null, "value": "CAMP.25.067" } ], "files_count": 1, "last_seen_details": [ { "first_seen": null, "confidence": "unconfirmed", "last_seen": null, "description": null, "value": "2025-10-21T00:00:00Z" } ], "private": false, "first_seen": 1741651200, "alt_names": [ "CAMP.25.067" ], "domains_count": 1, "campaign_type": "INDIVIDUAL", "subscribers_count": 4, "targeted_industries_tree": [ { "industry_group": "Construction & Engineering", "industry": null, "confidence": "confirmed", "first_seen": null, "last_seen": null, "description": null, "source": null }, { "industry_group": "Energy & Utilities", "industry": null, "confidence": "confirmed", "first_seen": null, "last_seen": null, "description": null, "source": null } ], "targeted_regions": [ "IN", "US", "TR" ], "collection_type": "campaign", "tags": [], "creation_date": 1761166941, "merged_actors": [], "recent_activity_relative_change": 3.5675675675675675, "ip_addresses_count": 12, "first_seen_details": [ { "first_seen": null, "confidence": "unconfirmed", "last_seen": null, "description": "Mandiant Observed First Activity of Campaign", "value": "2025-03-11T00:00:00Z" } ], "top_icon_md5": [ "665ef003fe1bcd289f20035fedeae280", "aa1c756e63d9559fd225cde44aa590f8", "39a349a4171759407f1aa76f9937b35f" ], "recent_activity_summary": [ 1, 8, 38, 1, 26, 25 ], "targeted_regions_hierarchy": [ { "region": "Asia", "sub_region": "Southern Asia", "country": "India", "country_iso2": "IN", "confidence": "confirmed", "first_seen": null, "last_seen": null, "description": null, "source": null } ], "operating_systems": [], "urls_count": 1, "source_regions_hierarchy": [], "summary_stats": { "first_submission_date": { "min": 0.0, "max": 1759859939.0, "avg": 879929969.5 }, "last_submission_date": { "min": 0.0, "max": 1759859939.0, "avg": 879929969.5 }, "files_detections": { "min": 0.0, "max": 0.0, "avg": 0.0 }, "urls_detections": { "min": 1.0, "max": 1.0, "avg": 1.0 } }, "tags_details": [], "detection_names": [], "last_modification_date": 1774224000, "motivations": [], "description": "Google Threat Intelligence Group (GTIG) has collected intelligence surrounding a campaign involving the modification of a GlobalProtect gateway to distribute a Trojanized update followed by the deployment of the SimpleHelp remote access backdoor. Based on available intelligence, targeted organizations have been located in India, Turkey, and the United States within the energy, technology, and manufacturing sectors. The campaign is being conducted by a threat actor GTIG tracks as UNC6425.", "targeted_industries": [], "capabilities": [], "malware_roles": [], "last_seen": 1761004800, "autogenerated_tags": [], "counters": { "files": 1, "domains": 1, "ip_addresses": 12, "urls": 1, "iocs": 15, "subscribers": 4, "attack_techniques": 37 }, "name": "Actor of Unknown Motivations Compromises GlobalProtect Gateway, Deploys SimpleHelp", "origin": "Google Threat Intelligence", "status": "COMPUTED", "collection_links": [], "references_count": 0, "aggregations": {} }, "context_attributes": { "shared_with_me": false, "role": "viewer" } } ], "meta": { "count": 1 }, "links": { "self": "https://www.virustotal.com/api/v3/collections/report--25-10050537/campaigns?limit=10" } }
ThreatQuotient provides the following default mapping for this feed based on each item within the .data[] list.
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.attributes.name |
Related Campaign.Value |
Campaign |
.attributes.last_modification_date |
APT28 Conducts Credential Harvesting Campaign Targeting Multiple European Entities |
N/A |
.attributes.description |
Related Campaign.Description |
N/A |
N/A |
Starting in early February 2024 ... |
N/A |
.attributes.motivations[].value |
Related Campaign.Attribute |
Motivation |
.attributes.last_modification_date |
Espionage |
User-configurable. |
.attributes.source_regions_hierarchy[].region |
Related Campaign.Attribute |
Source Region |
.attributes.last_modification_date |
Europe |
User-configurable. |
.attributes.source_regions_hierarchy[].sub_region |
Related Campaign.Attribute |
Source Sub Region |
.attributes.last_modification_date |
Eastern Europe |
User-configurable. |
.attributes.source_regions_hierarchy[].country |
Related Campaign.Attribute |
Source Country |
.attributes.last_modification_date |
Russian Federation |
User-configurable. |
.attributes.source_regions_hierarchy[].country_iso2 |
Related Campaign.Attribute |
Source Country Code |
.attributes.last_modification_date |
RU |
User-configurable. |
.attributes.targeted_regions_hierarchy[].region |
Related Campaign.Attribute |
Target Region |
.attributes.last_modification_date |
Europe |
User-configurable. |
.attributes.targeted_regions_hierarchy[].country |
Related Campaign.Attribute |
Target Country |
.attributes.last_modification_date |
France |
User-configurable. |
.attributes.targeted_regions_hierarchy[].sub_region |
Related Campaign.Attribute |
Target Sub Region |
.attributes.last_modification_date |
Western Europe |
User-configurable. |
.attributes.targeted_regions_hierarchy[].country_iso2 |
Related Campaign.Attribute |
Target Country Code |
.attributes.last_modification_date |
FR |
User-configurable. |
.attributes.last_seen |
Related Campaign.Attribute |
Last Seen |
.attributes.last_modification_date |
1727913600 |
User-configurable. Timestamp value. |
.attributes.targeted_industries_tree[].industry_group |
Related Campaign.Attribute |
Target Sector |
.attributes.last_modification_date |
Government |
User-configurable. |
Google Threat Intelligence Report Related Attack Patterns (Supplemental)
GET {base_url}/api/v3/collections/{report_id}/attack_techniques
Sample Response:
{ "data": [ { "id": "T1027", "type": "attack_technique", "links": { "self": "https://www.virustotal.com/api/v3/attack_techniques/T1027" }, "attributes": { "name": "Obfuscated Files or Information", "last_modification_date": 1761328155, "description": "Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \nPayloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and Deobfuscate/Decode Files or Information for User Execution. The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. Adversaries may also use compressed or archived scripts, such as JavaScript. \nPortions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. \nAdversaries may also abuse Command Obfuscation to obscure commands executed from payloads or directly via Command and Scripting Interpreter. Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. ", "revoked": false, "link": "https://attack.mitre.org/techniques/T1027/", "creation_date": 1496266232, "info": { "x_mitre_attack_spec_version": "3.2.0", "x_mitre_contributors": [ "Red Canary", "Christiaan Beek, @ChristiaanBeek" ], "x_mitre_deprecated": false, "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_is_subtechnique": false, "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "x_mitre_platforms": [ "ESXi", "Linux", "macOS", "Network Devices", "Windows" ], "x_mitre_version": "1.7", "x_mitre_detection": "" }, "stix_id": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a" } } ], "meta": { "count": 1 }, "links": { "self": "https://www.virustotal.com/api/v3/collections/report--3602a99f06e96bc189cf675fc8af90e810e9a84dc793f15b8c234f5fb46534e2/attack_techniques?limit=40" } }
ThreatQuotient provides the following default mapping for this feed based on each item within the .data[] list.
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.id + .attributes.name |
Related Attack Pattern.Value |
Attack Pattern |
.attributes.creation_date |
T1003 - OS Credential Dumping |
If there is a matching MITRE ATT&CK Pattern in ThreatQ, the library object is used; otherwise ID - Name is ingested. |
.attributes.description |
Related Attack Pattern.Description |
N/A |
N/A |
Adversaries may attempt to dump credentials ... |
N/A |
Google Threat Intelligence Report Related Malware (Supplemental)
GET {base_url}/api/v3/collections/{report_id}/malware_families
Sample Response:
{ "data": [ { "id": "malpedia_win_rokrat", "type": "collection", "links": { "self": "https://www.virustotal.com/api/v3/collections/malpedia_win_rokrat" }, "attributes": { "collection_links": [], "targeted_industries_tree": [], "detection_names": [], "motivations": [], "tags": [], "link": "https://malpedia.caad.fkie.fraunhofer.de/details/win.rokrat", "origin": "Partner", "private": false, "files_count": 337, "description": "It is a backdoor commonly distributed as an encoded\r\nbinary file downloaded and decrypted by shellcode following the\r\nexploitation of weaponized documents. DOGCALL is capable of\r\ncapturing screenshots, logging keystrokes, evading analysis with\r\nanti-virtual machine detections, and leveraging cloud storage APIs\r\nsuch as Cloud, Box, Dropbox, and Yandex.", "subscribers_count": 2, "alt_names": [ "DOGCALL" ], "recent_activity_summary": [ 407, 371, 319, 304 ], "source_regions_hierarchy": [], "summary_stats": { "first_submission_date": { "min": 0.0, "max": 1738167411.0, "avg": 1521224251.8153846 }, "last_submission_date": { "min": 0.0, "max": 1776794787.0, "avg": 1682006143.4646153 }, "files_detections": { "min": 0.0, "max": 70.0, "avg": 53.22769230769233 } }, "targeted_industries": [], "tags_details": [], "references_count": 278, "last_seen_details": [], "targeted_regions_hierarchy": [], "counters": { "files": 337, "domains": 0, "ip_addresses": 0, "urls": 0, "iocs": 337, "subscribers": 2, "attack_techniques": 0 }, "status": "COMPUTED", "recent_activity_relative_change": 0.19879227053140092, "first_seen_details": [], "last_modification_date": 1766565045, "top_icon_md5": [ "80890f0a8ed6b8f7644ae58033396698", "00ecd29321807c83650ce1e1216bc4f2", "fbbb78676d0ee4ddaf31a9257ebe155a" ], "urls_count": 0, "alt_names_details": [ { "last_seen": null, "confidence": "crowdsourced", "first_seen": null, "value": "DOGCALL", "description": null } ], "creation_date": 1610323200, "malware_roles": [], "targeted_regions": [], "ip_addresses_count": 0, "name": "RokRAT", "operating_systems": [], "autogenerated_tags": [ "attachment", "cve-2002-1623", "themida", "armadillo", "cve-2017-0147", "cve-1999-0016" ], "merged_actors": [], "capabilities": [], "domains_count": 0, "collection_type": "malware-family", "aggregations": {} }, "context_attributes": { "shared_with_me": false, "role": "viewer" } } ], "meta": { "count": 1 }, "links": { "self": "https://www.virustotal.com/api/v3/collections/report--597d77f83c7e9509c476c314c7da12d6819f56171ce4e0ca39fd6d947d884569/malware_families?limit=10" } }
ThreatQuotient provides the following default mapping for this feed based on each item within the .data[] list.
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.attributes.name |
Related Malware.Value |
Malware |
.attributes.last_modification_date |
MILDMAP |
N/A |
.attributes.description |
Related Malware.Description |
N/A |
N/A |
MILDMAP is an APT28 dropper ... |
N/A |
.attributes.operating_systems[].value |
Related Malware.Attribute |
Target Operating System |
.attributes.last_modification_date |
Windows |
User-configurable. |
.attributes.targeted_industries_tree[].industry_group |
Related Malware.Attribute |
Industry |
.attributes.last_modification_date |
Technology |
User-configurable. |
.attributes.detection_names[].value |
Related Malware.Attribute |
Detection |
.attributes.last_modification_date |
N/A |
User-configurable. |
Google Threat Intelligence Report Related Vulnerabilities (Supplemental)
GET {base_url}/api/v3/collections/{report_id}/vulnerabilities
Sample Response (truncated):
{ "data": [ { "id": "vulnerability--cve-2025-55182", "type": "collection", "links": { "self": "https://www.virustotal.com/api/v3/collections/vulnerability--cve-2025-55182" }, "attributes": { "alt_names_details": [ { "value": "React2Shell", "confidence": "possible", "last_seen": null, "description": null, "first_seen": null } ], "subscribers_count": 12, "exploitation_state": "Wide", "cisa_known_exploited": { "added_date": 1764892800, "ransomware_use": "Known", "due_date": 1765497600 }, "top_icon_md5": [], "name": "CVE-2025-55182", "recent_activity_relative_change": 0.09832134292565953, "targeted_industries_tree": [], "cwe": { "id": "CWE-502", "title": "Deserialization of Untrusted Data" }, "recent_activity_summary": [ 30, 26 ], "exploitation_vectors": [ "Exposed Web Application", "Unspecified Remote Vector" ], "exploit_availability": "Publicly Available", "ip_addresses_count": 0, "creation_date": 1764778560, "summary_stats": { "first_submission_date": { "min": 0.0, "max": 1771893030.0, "avg": 198504091.34810126 }, "last_submission_date": { "min": 0.0, "max": 1776700270.0, "avg": 201306004.92405063 }, "files_detections": { "min": 0.0, "max": 12.0, "avg": 0.14556962025316456 } }, "cpes": [], "references_count": 0, "counters": { "files": 204, "domains": 0, "ip_addresses": 0, "urls": 0, "iocs": 204, "subscribers": 12, "attack_techniques": 0 }, "collection_type": "vulnerability", "origin": "Google Threat Intelligence", "exploitation_consequence": "Code Execution", "targeted_regions": [], "detection_names": [], } }
ThreatQuotient provides the following default mapping for this feed based on each item within the .data[] list.
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.attributes.name |
Related Vulnerability/Indicator.Value |
CVE |
.attributes.creation_date |
CVE-2004-0210 |
User-configurable. Based on Ingest CVEs As. |
.attributes.description |
Related Vulnerability/Indicator.Description |
N/A |
N/A |
The National Vulnerability Database ... |
N/A |
.attributes.cvss.cvssv2_0.vector |
Related Vulnerability/Indicator.Attribute |
CVSS v2 Vector |
.attributes.creation_date |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
User-configurable. |
.attributes.cvss.cvssv2_0.base_score |
Related Vulnerability/Indicator.Attribute |
CVSS v2 Base Score |
.attributes.creation_date |
7.2 |
User-configurable. |
.attributes.cvss.cvssv2_0.temporal_score |
Related Vulnerability/Indicator.Attribute |
CVSS v2 Temporal Score |
.attributes.creation_date |
6.0 |
User-configurable. |
.attributes.cvss.cvssv3_x.vector |
Related Vulnerability/Indicator.Attribute |
CVSS v3 Vector |
.attributes.creation_date |
CVSS:3.1/AV:L/AC:L/... |
User-configurable. |
.attributes.cvss.cvssv3_x.base_score |
Related Vulnerability/Indicator.Attribute |
CVSS v3 Base Score |
.attributes.creation_date |
7.8 |
User-configurable. |
.attributes.cvss.cvssv3_x.temporal_score |
Related Vulnerability/Indicator.Attribute |
CVSS v3 Temporal Score |
.attributes.creation_date |
7.8 |
User-configurable. |
.attributes.exploitation_vectors[] |
Related Vulnerability/Indicator.Attribute |
Exploitation Vector |
.attributes.creation_date |
Local Access |
User-configurable. |
.attributes.epss.score |
Related Vulnerability/Indicator.Attribute |
EPSS Score |
.attributes.creation_date |
0.10564 |
User-configurable. |
Related Signatures
No additional API call is required. Signatures are extracted from the report detail payload.
GET {base_url}/api/v3/collections/{report_id}
Sample Response:
{ "data": { "id": "report--c81eb59b-89fe-5c73-8659-5cd10d51e2b3", "type": "collection", "attributes": { "aggregations": { "files": { "crowdsourced_yara_results": [ { "rule_name": "STXRatLoader", "ruleset_name": "STXRat", "source": "https://github.com/kevoreilly/CAPEv2" } ] } } } } }
ThreatQuotient provides the following default mapping for related signatures:
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.attributes.aggregations.files.crowdsourced_yara_results[].value.rule_name |
Related Signature.Value |
Yara |
N/A |
STXRatLoader |
Ingested only when Ingest Crowdsourced Yara as Signatures is enabled. |
.attributes.aggregations.files.crowdsourced_yara_results[].value.ruleset_name |
Related Signature.Attribute |
Ruleset |
N/A |
STXRat |
N/A |
.attributes.aggregations.files.crowdsourced_yara_results[].value.source |
Related Signature.Attribute |
Source |
N/A |
https://github.com/kevoreilly/CAPEv2 |
N/A |
Google Threat Intelligence Report Related Indicators (Supplemental)
GET {base_url}/api/v3/collections/{report_id}/{indicator_endpoint}
Sample Response:
{ "data": [ { "id": "whereisitat.lucyatemysuperbox.space", "type": "domain", "attributes": { "last_modification_date": 1776894367 } }, { "id": "077d49fa708f498969d7cdffe701eb64675baaa4968ded9bd97a4936dd56c21c", "type": "file", "attributes": { "md5": "150cce17d72f765217e69f36d6d6bf64", "sha1": "8ba3977352e5a0fb06f0ac7d774665d3dc908cce", "sha256": "ed97719c008422925ae21ff34448a8c35ee270a428b0478e24669396761d0790", "last_modification_date": 1776894367 } } ] }
ThreatQuotient provides the following default mapping for this feed based on each item within the .data[] list.
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.id |
Related Indicator.Value |
IP Address / FQDN |
.attributes.last_modification_date |
95.216.51.236, japanroom.com |
Used for ip_addresses and domains. |
.attributes.last_final_url or .attributes.url |
Related Indicator.Value |
URL |
.attributes.last_modification_date |
https://example.com/path |
Used for urls. |
.attributes.md5 |
Related Indicator.Value |
MD5 |
.attributes.last_modification_date |
5133177ac4950cf772d2f729bb0622ec |
Used when MD5 is selected. |
.attributes.sha1 |
Related Indicator.Value |
SHA-1 |
.attributes.last_modification_date |
042839871fa456d7d82b34a1eb85de5afe54ccd1 |
Used when SHA-1 is selected. |
.attributes.sha256 |
Related Indicator.Value |
SHA-256 |
.attributes.last_modification_date |
1cc7939b1a7d7462f1cf54ba88d2ab2b62a70e225d31b4883e9c42ecbd230ff3 |
Used when SHA-256 is selected. |
Related indicators are currently ingested as indicator data only. No indicator attributes are mapped by default.
Indicator Type Mapping
The following table outlines the mapping between ThreatQ indicator types and Google Threat Intelligence (GTI) endpoints.
| ThreatQ Indicator Type | GTI Endpoint |
|---|---|
IP Address |
ip_addresses |
IPv6 Address |
ip_addresses |
FQDN |
domains |
URL |
urls |
MD5 |
files |
SHA-1 |
files |
SHA-256 |
files |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
| Metric | Result |
|---|---|
| Run Time | 15 minutes |
| Adversaries | 24 |
| Adversary Attributes | 444 |
| Attack Patterns | 253 |
| Indicators | 3,552 |
| Malware | 72 |
| Reports | 80 |
| Report Attributes | 518 |
| Signatures | 354 |
| Signature Attributes | 708 |
| Vulnerabilities | 40 |
Known Issues / Limitations
-
GTI report relationships are retrieved through multiple supplemental API calls, which may result in increased API usage and rapid consumption of quota during historical feed runs.
Change Log
- Version 3.0.0
- Rebranded the integration to Google Threat Intelligence Reports CDF.
- Introduced the initial GTI-native reports feed and restructured report relationships into dedicated supplemental feeds for details, adversaries, campaigns, attack patterns, malware, vulnerabilities, and indicators.
- Updated the minimum ThreatQ version to 5.12.1.
- Version 2.0.2
- Renamed the Parse for IOCs parameter to Parse IOCs from Content.
- Added a new supplemental feed, Mandiant Report Related Indicators, which gives users the option to ingest indicators from reports.
- Added the following new configuration parameters:
- Bring Related Indicators - enable the feed to bring in indicators related to the report.
- Enable SSL Certificate Verification - enable or disable verification of the server's SSL certificate.
- Disable Proxies - determine if the feed should honor proxy settings set in the ThreatQ UI.
- Resolved a YARA format issue that would occur after ingestion into ThreatQ.
- Version 2.0.1
- Added the ability to parse YARA rules from reports with the new Parse YARA configuration parameter.
- Resolved a
Type Errorthat would occur with MITRE ATT&CK Patterns.
- Version 2.0.0
- Added the ability to fetch data older than 90 days.
- Added a new attribute:
Intended Effect. - Updated the way relationships and attributes are made.
- Added support for News Analysis Reports.
- Added two new configuration options:
- Ingest CVEs As
- Parse for IoCs
- The IOC Parser now utilizes the built-in ThreatQ indicator parser.
- Vulnerability Reports will now be ingested as Vulnerability objects.
- Resolved an issue where users would encounter a
filter-mappingerror when loading MITRE Attack Patterns from the ThreatQ API.
- Version 1.1.4
- Removed the restriction on description length.
- Resolved an issue where IOCs from report descriptions were not ingested.
- Updated minimum ThreatQ version to 5.6.0.
- Version 1.1.3
- IP addresses, FQDNs and URLs are now ingested as indicators when parsed from a report
- Version 1.1.2
- Updated the
response_content_typefor all Mandiant API requests. - Updated the method for retrieving Attack Patterns from the ThreatQ API.
- Updated the
- Version 1.1.0
- Decreased the number of API Attack Patterns retrieved, per request, to prevent timeout errors.
- Version 1.0.1
- Fixed an issue with the
Categoryfield that prevented users from installing the integration on ThreatQ version 4 instances.
- Fixed an issue with the
- Version 1.0.0
- Initial release
PDF Guides
| Document | ThreatQ Version |
|---|---|
| Google Threat Intelligence Reports CDF v3.0.0 | 5.12.1 or Greater |
| Mandiant Intelligence Reports CDF Guide v2.0.2 | 5.6.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v2.0.1 | 5.6.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v2.0.0 | 5.6.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v1.1.4 | 5.6.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v1.1.3 | 4.34.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v1.1.2 | 4.34.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v1.1.0 | 4.34.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v1.0.1 | 4.34.0 or Greater |
| Mandiant Intelligence Reports CDF Guide v1.0.0 | 4.34.0 or Greater |