IoC Collection

Information about IoC collections

IoC collections are sets of IoCs (files, URLs, IPs and domains) related to threat campaigns or malware families provided by the community, users, researchers, investigators and our Google TI experts.

Object Attributes

A IoC collection object contains the following attributes:

  • aggregations: <dictionary> dictionary of commonalities between the different IoCs associated with the IoC collection, grouped by IoC type (files, URLs, domains, IP addresses).
    • domains: <dictionary> technical commonalities among all domains tied to the collection.
    • files: <dictionary> technical commonalities among all files tied to the collection.
    • ip_addresses: <dictionary> technical commonalities among all IP addresses tied to the collection.
    • urls: <dictionary> technical commonalities among all URLs tied to the collection.
  • collection_type: <string> identifies the type of the object. For IoC collections the value of this attribute is collection.
  • counters: <dictionary> dictionary of counters of related objects.
    • attack_techniques: <integer> number of MITRE ATT&CK techniques associated with the collection.
    • domains: <integer> number of domains related to the collection.
    • files: <integer> number of files related to the collection.
    • iocs: <integer> number of IoCs (files + URLs + domains + IP addresses) related to the collection.
    • ip_addresses: <integer> number of IP addresses related to the collection.
    • subscribers: <integer> number of users subscribed to the collection.
    • urls: <integer> number of URLs related to the collection.
  • creation_date: <integer> collection object creation date (UTC timestamp).
  • description: <string> description / context about the collection.
  • first_seen_details: <list of dictionaries> dictionaries with additional information related to the first activity among the IoCs of the collection, differentiating between confirmed and suspected activity.
    • confidence: <string> confidence on the information of the first activity seen among the IoCs associated with the collection.
    • description: <string> description / additional information about the first activity seen among the IoCs associated with the collection.
    • first_seen: <integer> the first time this first activity date has been attributed to the collection (UTC timestamp).
    • last_seen: <integer> the last time this first activity date has been attributed to the collection (UTC timestamp).
    • value: <string> date when the first observation about that collection was made ("YYYY-MM-DDTHH:mm:ssZ" format).
  • last_modification_date: <integer> last time when the collection's information was updated (UTC timestamp).
  • last_seen_details: <list of dictionaries> dictionaries with additional information related to the last activity among the IoCs of the collection, differentiating between confirmed and unconfirmed activity.
    • confidence: <string> confidence on the information or the last activity seen among the IoCs associated with the collection.
    • description: <string> description / additional information about the last activity seen among the IoCs associated with the collection.
    • first_seen: <integer> the first time this last activity date has been attributed to the collection (UTC timestamp).
    • last_seen: <integer> the last time this last activity date has been attributed to the collection (UTC timestamp).
    • value: <string> date when the last observation about that collection was made ("YYYY-MM-DDTHH:mm:ssZ" format).
  • name: <string> collection's name.
  • origin: <string> identifies the source of the information. Partner for curated objects from trusted partners and security researchers, Google Threat Intelligence for curated objects from our Google TI experts and Crowdsourced for OSINT objects from the community.
  • private: <boolean> whether the collection object is private or not.
  • recent_activity_relative_change: <float> ratio of change between the last two "recent activity" periods. Note: "recent activity" refers to a period of 14 days.
  • recent_activity_summary: <list of integers> time series representing the activity of the IoCs that belong to the collection. (2 weeks)
  • source_regions_hierarchy: <list of dictionaries> country or region from which the malicious activity is known to originate.
    • confidence: <string> confidence on the information related to the source region of the malicious activity.
    • country: <string> country from which malicious activity is known to originate.
    • country_iso2: <string> source country in ISO 3166 Alpha2 - code format.
    • description: <string> description / additional information about the source region of the malicious activity.
    • first_seen: <integer> the first time this source region was attributed to the collection (UTC timestamp).
    • last_seen:<integer> the last time this source region was attributed to the collection (UTC timestamp).
    • region: <string> region from which the malicious activity is known to originate.
    • source: <string> information's supplier.
    • sub_region: <string> subregion from which the malicious activity is known to originate.
  • status: <string> indicates if the object has attributes pending to be computed again (e.g. top_icon_md5 after making changes). The possible values are PENDING_RECOMPUTE and COMPUTED.
  • tags_details: <list of dictionaries> dictionaries of tags associated with the collection with some additional context.
    • confidence: <string> confidence on the information or the tag association to the collection.
    • description: <string> description / additional information related to the tag associated to the collection.
    • first_seen: <integer> the first time this tag was attributed to the collection (UTC timestamp).
    • last_seen: <integer> the last time this tag was attributed to the collection (UTC timestamp).
    • value: <string> value of the tag.
  • targeted_industries_tree: <list of dictionaries> list of industries and industry groups known to be targeted by the collection's associated campaign or malicious activity.
    • confidence: <string> confidence on the information related to the industry targeted by the malicious activity.
    • description: <string> description / additional information about the industry targeted by the malicious activity.
    • first_seen: <integer> the first time this targeted industry was associated with the collection (UTC timestamp).
    • last_seen: <integer> the last time this targeted industry was associated with the collection (UTC timestamp).
    • industry: <string> sub-industry targeted by the malicious activity.
    • industry_group: <string> industry group targeted by the malicious activity.
    • source: <string> information's supplier.
  • targeted_regions_hierarchy: <list of dictionaries> list of regions and countries known to be targeted by collection's associated campaign or malicious activity.
    • confidence: <string> confidence on the information related to the region targeted by the malicious activity.
    • country: <string> country targeted by the malicious activity.
    • country_iso2: <string> targeted country in ISO 3166 Alpha2 - code format.
    • description: <string> description / additional information about the region targeted by the malicious activity.
    • first_seen: <integer> the first time this targeted region was associated with the collection (UTC timestamp).
    • last_seen:<integer> : the last time this targeted region was associated with the collection (UTC timestamp).
    • region: <string> region targeted by the malicious activity.
    • sub_region: <string> sub-region targeted by the malicious activity.
    • source: <string> information's supplier.
  • top_icon_md5: <list of strings> list of the 3 most frequent icons among the collection's associated IoCs (file's icons, URLs and domain's favicons). Favicons are represented by their MD5 hash.

Relationships

In addition to the previously described attributes, IoC collection objects contain relationships with other objects in our dataset that can be retrieved as explained in the Relationships section.

The following table shows a summary of available relationships.

RelationshipReturn object type
associationsList of all objects (Reports, Campaigns, IoC collections, Malware families, Software and Toolkits, Vulnerabilities, Threat Actors) associated with the current IoC collection, without filtering by the object type.
attack_techniquesList of MITRE ATT&CK techniques.
autogenerated_graphsList of graphs related to the current IoC collection.
campaignsList of associated Campaign objects.
collectionsList of associated IoC collection objects.
commentsList of Comments.
domainsList of Domains associated with the IoC collection.
editorsList of users, groups and data connectors that can edit this threat actor (only available to the owner or editor of the entity).
filesList of Files associated with the IoC collection.
hunting_rulesetsList of curated YARA rulesets assigned by the entity owner.
ip_addressesList of IP addresses associated with the IoC collection.
malware_familiesList of associated Malware family objects.
ownerUser who created the object.
related_collectionsList of objects (Reports, Campaigns, IoC collections, Malware families, Software and Toolkits, Vulnerabilities, Threat Actors) containing IoCs associated with this entity.
reportsList of associated Report objects.
sigma_rulesList of crowdsourced SIGMA rulesets matching at least one file associated with this IoC collection.
software_toolkitsList of associated Software or Toolkit objects.
threat_actorsList of other threat actors associated to the current IoC collection.
urlsList of URLs associated with the IoC collection.
viewersList of users, groups and data connectors that can view the entity (only available to the owner or editor of the entity).
vulnerabilitiesList of associated Vulnerability objects.
yara_rulesetsList of crowdsourced YARA rulesets matching at least one file associated with this IoC collection.