Software and Toolkit

🚧

Special privileges required

Software and Toolkits are only available to users with the Google Threat Intelligence (Google TI) Enterprise or Enterprise plus license.

Software and toolkits are digital tools used by threat actors in their threat campaigns.

Object Attributes

A software and toolkits object contains the following attributes:

  • aggregations: <dictionary> dictionary of commonalities between the different IoCs associated with the software or toolkit, grouped by IoC type (files, URLs, domains, IP addresses).
    • files: <dictionary> technical commonalities among all files tied to the software or toolkit.
    • urls: <dictionary> technical commonalities among all URLs tied to the software or toolkit.
    • domains: <dictionary> technical commonalities among all domains tied to the software or toolkit.
    • ip_addresses: <dictionary> technical commonalities among all IP addresses tied to the software or toolkit.
  • alt_names_details: <list of dictionaries> dictionary of alternative names / aliases by which the software or toolkit could be known known, including additional data such as the confidence of the information.
    • value: <string> the alternative name.
    • description: <string> descriptive information related to the alternative name.
    • confidence: <string> the confidence of the alternative name associated to the software or toolkit.
    • first_seen: <integer> the first time when the alternative name was seen in the wild (UTC timestamp).
    • last_seen: <integer> the last time when the alternative name was seen in the wild (UTC timestamp).
  • capabilities: <list of dictionaries> list of capabilities associated to software or toolkit's files,
    • value: <string> capability associated to software or toolkit's files.
    • confidence: <string> the confidence of the software or toolkit's associated capability.
    • description: <string> description of the capability.
    • first_seen: <integer> the first time when the capability was associated to the software or toolkit (UTC timestamp).
    • last_seen: <integer> the first time when the capability was associated to the software or toolkit (UTC timestamp).
  • collection_type: <string> identifies the type of the object. For software and toolkits the value of this attribute is software_toolkits.
  • counters: <dictionary> dictionary of counters of related objects.
    • attack_techniques: <integer> number of MITRE ATT&CK techniques associated with the software or toolkits.
    • domains: <integer> number of domains related to the software or toolkits.
    • files: <integer> number of files related to the software or toolkits.
    • iocs: <integer> number of IoCs (files + URLs + domains + IP addresses) related to the software or toolkits.
    • ip_addresses: <integer> number of IP addresses related to the software or toolkits.
    • subscribers: <integer> number of users subscribed to the software or toolkits.
    • urls: <integer> number of URLs related to the software or toolkits.
  • creation_date: <integer> software or toolkit object creation date (UTC timestamp).
  • description: <string> description / context about the software or toolkit.
  • detection_names: <list of dictionaries> list of external detection names associated to software or toolkits with additional context.
    • value: <string> the detection name.
    • description: <string> descriptive information related to the detection name.
    • confidence: <string> the confidence of the detection name associated to the software or toolkit.
    • first_seen: <integer> the first time when the detection name was associated to the software or toolkit (UTC timestamp).
    • last_seen: <integer> the last time when the detection name was associated to the software or toolkit (UTC timestamp).
  • last_modification_date: <integer> last time when the software or toolkit's information was updated (UTC timestamp).
  • last_seen_details: <list of dictionaries> dictionaries with additional information related to the software or toolkit's last activity, differentiating between confirmed and unconfirmed activity.
    • confidence: <string> confidence on the information or the attribution of the last activity seen related to the software or toolkit.
    • description: <string> description / additional information about the last activity seen related to the software or toolkit.
    • first_seen: <integer> the first time this last activity date has been attributed to the software or toolkit (UTC timestamp).
    • last_seen: <integer> the last time this last activity date has been attributed to the software or toolkit (UTC timestamp).
    • value: <string> date when the last observation about that software or toolkit was made ("YYYY-MM-DDTHH:mm:ssZ" format).
  • malware_roles: <list of dictionaries> the list of malware roles associated to the software or toolkit.
    • value: <string> the malware role name associated to the software or toolkit.
    • first_seen: <integer> the first time when the malware role was associated to the software or toolkit (UTC timestamp).
    • last_seen: <integer> the last time when the malware role was associated to the software or toolkit (UTC timestamp).
    • confidence: <string> the confidence of the software or toolkit's associated malware role.
    • description: <string> descriptive information related to the software or toolkit's associated malware role.
  • name: <string> software or toolkit's name.
  • operating_systems: <list of dictionaties> operating systems affected by the software or toolkit. Possible values: Android, BSD, FreeBSD, Linux, Mac, Unix, VMkernel, Windows, ios.
    • value: <string> affected operating system.
    • first_seen: <integer> the first time when the operting system was associated to the software or toolkit (UTC timestamp).
    • last_seen: <integer> the last time when the operting system was associated to the software or toolkit (UTC timestamp).
    • confidence: <string> the confidence that the operating system is affected by the software or toolkit.
    • description: <string> descriptive information related to the software or toolkit's targeted operating system.
  • origin: <string> identifies the source of the information. Partner for curated objects from trusted partners and security researchers and Google Threat Intelligence for curated objects from our Google TI experts.
  • private: <boolean> whether the software or toolkit object is private or not.
  • recent_activity_summary: <list of integers> time series representing the activity of the indicators of compromise related to the software or toolkit. (2 weeks)
  • status: <string> indicates if the object has attributes pending to be computed again (e.g. top_icon_md5 after making changes). The possible values are PENDING_RECOMPUTE and COMPUTED.
  • targeted_industries_tree: <list of dictionaries> list of industries and industry groups known to be targeted by the software or toolkit.
    • confidence: <string> confidence on the information or the industry targeted by the software or toolkit.
    • description: <string> description / additional information related to the industry targeted by the software or toolkit.
    • first_seen: <integer> the first time this targeted industry was associated with the software or toolki (UTC timestamp).
    • industry: <string> sub-industry targeted by the software or toolkit.
    • industry_group: <string> industry group targeted by the software or toolkit.
    • last_seen: <integer> the last time this targeted industry was associated with the software or toolki (UTC timestamp).
    • source: <string> information's supplier.

Relationships

In addition to the previously described attributes, software and toolkits objects contain relationships with other objects in our dataset that can be retrieved as explained in the Relationships section.

The following table shows a summary of available relationships.

RelationshipReturn object type
associationsList of all objects (Reports, Campaigns, IoC collections, Malware families, Software and Toolkits, Vulnerabilities, Threat Actors) associated with the current malware family, without filtering by the object type.
attack_techniquesList of MITRE ATT&CK techniques.
campaignsList of associated Campaign objects.
collectionsList of associated IoC collection objects.
commentsList of Comments.
domainsList of Domains associated with the software or toolkit.
editorsList of users, groups and data connectors that can edit this threat actor (only available to the owner or editor of the entity).
filesList of Files associated with the software or tolkit.
hunting_rulesetsList of curated YARA rulesets assigned by the entity owner.
ip_addressesList of IP addresses associated with the software or toolkit.
malware_familiesList of associated Malware family objects.
ownerUser who created the object.
related_collectionsList of objects (Reports, Campaigns, IoC collections, Malware families, Software and Toolkits, Vulnerabilities, Threat Actors) containing IoCs associated with this entity.
reportsList of associated Report objects.
sigma_rulesList of crowdsourced SIGMA rulesets matching at least one file associated with this software or toolkit.
software_toolkitsList of associated Software or Toolkit objects.
statsLookups and submissions trends.
threat_actorsList of other threat actors associated to the current software or toolkit.
urlsList of URLs associated with the software or toolkit.
viewersList of users, groups and data connectors that can view the entity.
vulnerabilitiesList of associated Vulnerability objects.
yara_rulesetsList of crowdsourced YARA rulesets matching at least one file associated with this software or toolkit.