Special privileges required
IoC collections are only available to users with the Google Threat Intelligence (Google TI) Enterprise or Enterprise plus license.
IoC collections are sets of IoCs (files, URLs, IPs and domains) related to threat campaigns or malware families provided by the community, users, researchers, investigators and our Google TI experts.
Object Attributes
A IoC collection object contains the following attributes:
aggregations
: <dictionary> dictionary of commonalities between the different IoCs associated with the IoC collection, grouped by IoC type (files, URLs, domains, IP addresses).files
: <dictionary> technical commonalities among all files tied to the collection.urls
: <dictionary> technical commonalities among all URLs tied to the collection.domains
: <dictionary> technical commonalities among all domains tied to the collection.ip_addresses
: <dictionary> technical commonalities among all IP addresses tied to the collection.
autogenerated_tags
: <list of strings> relevant tags automatically generated by AI.collection_type
: <string> identifies the type of the object. For IoC collections the value of this attribute iscollection
.counters
: <dictionary> dictionary of counters of related objects.attack_techniques
: <integer> number of MITRE ATT&CK techniques associated with the collection.domains
: <integer> number of domains related to the collection.files
: <integer> number of files related to the collection.iocs
: <integer> number of IoCs (files + URLs + domains + IP addresses) related to the collection.ip_addresses
: <integer> number of IP addresses related to the collection.subscribers
: <integer> number of users subscribed to the collection.urls
: <integer> number of URLs related to the collection.
creation_date
: <integer> collection object creation date (UTC timestamp).description
: <string> description / context about the collection.first_seen_details
: <list of dictionaries> dictionaries with additional information related to the first activity among the IoCs of the collection, differentiating between confirmed and suspected activity.confidence
: <string> confidence on the information of the first activity seen among the IoCs associated with the collection.description
: <string> description / additional information about the first activity seen among the IoCs associated with the collection.first_seen
: <integer> the first time this first activity date has been attributed to the collection (UTC timestamp).last_seen
: <integer> the last time this first activity date has been attributed to the collection (UTC timestamp).value
: <string> date when the first observation about that collection was made ("YYYY-MM-DDTHH:mm:ssZ" format).
last_modification_date
: <integer> last time when the collection's information was updated (UTC timestamp).last_seen_details
: <list of dictionaries> dictionaries with additional information related to the last activity among the IoCs of the collection, differentiating between confirmed and unconfirmed activity.confidence
: <string> confidence on the information or the last activity seen among the IoCs associated with the collection.description
: <string> description / additional information about the last activity seen among the IoCs associated with the collection.first_seen
: <integer> the first time this last activity date has been attributed to the collection (UTC timestamp).last_seen
: <integer> the last time this last activity date has been attributed to the collection (UTC timestamp).value
: <string> date when the last observation about that collection was made ("YYYY-MM-DDTHH:mm:ssZ" format).
name
: <string> collection's name.origin
: <string> identifies the source of the information. Partner for curated objects from trusted partners and security researchers, Google Threat Intelligence for curated objects from our Google TI experts and Crowdsourced for OSINT objects from users.private
: <boolean> whether the collection object is private or not.recent_activity_relative_change
: <float> ratio of change between the last two "recent activity" periods. Note: "recent activity" refers to a period of 14 days.recent_activity_summary
: <list of integers> time series representing the activity of the IoCs that belong to the collection. (2 weeks)source_regions_hierarchy
: <list of dictionaries> country or region from which the malicious activity is known to originate.confidence
: <string> confidence on the information related to the source region of the malicious activity.country
: <string> country from which malicious activity is known to originate.country_iso2
: <string> source country in ISO 3166 Alpha2 - code format.description
: <string> description / additional information about the source region of the malicious activity.first_seen
: <integer> the first time this source region was attributed to the collection (UTC timestamp).last_seen
:<integer> the last time this source region was attributed to the collection (UTC timestamp).region
: <string> region from which the malicious activity is known to originate.source
: <string> information's supplier.sub_region
: <string> subregion from which the malicious activity is known to originate.
status
: <string> indicates if the object has attributes pending to be computed again (e.g. top_icon_md5 after making changes). The possible values arePENDING_RECOMPUTE
andCOMPUTED
.tags_details
: <list of dictionaries> dictionaries of tags associated with the collection with some additional context.confidence
: <string> confidence on the information or the tag association to the collection.description
: <string> description / additional information related to the tag associated to the collection.first_seen
: <integer> the first time this tag was attributed to the collection (UTC timestamp).last_seen
: <integer> the last time this tag was attributed to the collection (UTC timestamp).value
: <string> value of the tag.
targeted_industries_tree
: <list of dictionaries> list of industries and industry groups known to be targeted by the collection's associated campaign or malicious activity.confidence
: <string> confidence on the information related to the industry targeted by the malicious activity.description
: <string> description / additional information about the industry targeted by the malicious activity.first_seen
: <integer> the first time this targeted industry was associated with the collection (UTC timestamp).last_seen
: <integer> the last time this targeted industry was associated with the collection (UTC timestamp).industry
: <string> sub-industry targeted by the malicious activity.industry_group
: <string> industry group targeted by the malicious activity.source
: <string> information's supplier.
targeted_regions_hierarchy
: <list of dictionaries> list of regions and countries known to be targeted by collection's associated campaign or malicious activity.confidence
: <string> confidence on the information related to the region targeted by the malicious activity.country
: <string> country targeted by the malicious activity.country_iso2
: <string> targeted country in ISO 3166 Alpha2 - code format.description
: <string> description / additional information about the region targeted by the malicious activity.first_seen
: <integer> the first time this targeted region was associated with the collection (UTC timestamp).last_seen
:<integer> : the last time this targeted region was associated with the collection (UTC timestamp).region
: <string> region targeted by the malicious activity.sub_region
: <string> sub-region targeted by the malicious activity.source
: <string> information's supplier.
top_icon_md5
: <list of strings> list of the 3 most frequent icons among the collection's associated IoCs (file's icons, URLs and domain's favicons). Favicons are represented by their MD5 hash.
Relationships
In addition to the previously described attributes, IoC collection objects contain relationships with other objects in our dataset that can be retrieved as explained in the Relationships section.
The following table shows a summary of available relationships.
Relationship | Return object type |
---|---|
associations | List of all associated objects (Reports, Campaigns, IoC collections, Malware families, Software and Toolkits, Vulnerabilities, Threat Actors) associated with the current threat actor, without filtering by the object type. |
attack_techniques | List of MITRE ATT&CK techniques. |
autogenerated_graphs | List of graphs related to the current IoC collection. |
campaigns | List of associated Campaign objects. |
comments | List of Comments. |
domains | List of Domains associated with the IoC collection. |
editors | List of users, groups and data connectors that can edit this threat actor (only available to the owner or editor of the entity). |
files | List of Files associated with the IoC collection. |
hunting_rulesets | List of curated YARA rulesets assigned by the entity owner. |
ip_addresses | List of IP addresses associated with the IoC collection. |
malware_families | List of associated Malware family objects. |
owner | User who created the object. |
related_collections | List of objects (Reports, Campaigns, IoC collections, Malware families, Software and Toolkits, Vulnerabilities, Threat Actors) containing IoCs associated with this entity. |
reports | List of associated Report objects. |
sigma_rules | List of crowdsourced SIGMA rulesets matching at least one file associated with this IoC collection. |
software_toolkits | List of associated Software or Toolkit objects. |
stats | Lookups and submissions trends. |
threat_actors | List of other threat actors associated to the current IoC collection. |
urls | List of URLs associated with the IoC collection. |
viewers | List of users, groups and data connectors that can view the entity. |
vulnerabilities | List of associated Vulnerability objects. |
yara_rulesets | List of crowdsourced YARA rulesets matching at least one file associated with this IoC collection. |