- Notifications
You must be signed in to change notification settings - Fork 513
[Google Threat Intelligence] Add phishing, ransomware, threat_actor, trending and vulnerability_weaponization data streams #13236
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Google Threat Intelligence] Add phishing, ransomware, threat_actor, trending and vulnerability_weaponization data streams #13236
Conversation
| Hey @jamiehynds & @andrewkroh |
| Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
| Hi! We just realized that we haven't looked into this PR in a while. We're sorry! We're labeling this issue as |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please revert this. If it needs to be fixed, please make a separate PR or issue.
efd6 left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks
| /test |
| Hello @efd6, |
| @niraj-crest We are waiting on review. |
| /test |
🚀 Benchmarks reportPackage |
| Data stream | Previous EPS | New EPS | Diff (%) | Result |
|---|---|---|---|---|
iot | 8474.58 | 5555.56 | -2919.02 (-34.44%) | 💔 |
linux | 9174.31 | 6289.31 | -2885 (-31.45%) | 💔 |
malicious_network_infrastructure | 10101.01 | 5555.56 | -4545.45 (-45%) | 💔 |
malware | 10638.3 | 6097.56 | -4540.74 (-42.68%) | 💔 |
mobile | 11111.11 | 6369.43 | -4741.68 (-42.68%) | 💔 |
osx | 10752.69 | 6711.41 | -4041.28 (-37.58%) | 💔 |
To see the full report comment with /test benchmark fullreport
| {"data":{"type":"domain","id":"1freeprivacytoolsforyou.xyz","attributes":{"gti_assessment":{"verdict":{"value":"VERDICT_MALICIOUS"},"threat_score":{"value":60},"severity":{"value":"SEVERITY_MEDIUM"}},"creation_date":1627032803,"jarm":"29d29d16d29d29d21c29d29d29d29d21ce4eed32174656499cf8d445b1a6e3","last_analysis_stats":{"malicious":9,"suspicious":2,"undetected":30,"harmless":53},"last_modification_date":1740123063,"positives":9,"tld":["xyz"]},"relationships":{"threat_actors":{"data":[{"id":"threat-actor--b6c5648f-b348-59e9-8caf-874f8fc8424a","type":"collection","attributes":{"name":"unc3525","collection_type":"threat-actor"}}]}}}} | ||
| {"data":{"type":"file","id":"ffbd26ad0a22a5bd9e1b473c576c1676b8b8c9f52dda67e8eb267cd00e4fcc4a","attributes":{"gti_assessment":{"verdict":{"value":"VERDICT_MALICIOUS"},"threat_score":{"value":30},"severity":{"value":"SEVERITY_LOW"}},"first_submission_date":1681947913,"last_analysis_date":1740121234,"last_analysis_stats":{"malicious":45,"undetected":19,"typeUnsupported":13},"last_modification_date":1740121446,"last_submission_date":1740121234,"md5":"50ab6dc1d7e49cb738e27582b20a2eea","meaningful_name":"32397fadc2bd6e066eec5a8c5ff4838e2cc43c2e0a3e2620f2c9e9d0c259a369-1729405840159547980.gz","names":["32397fadc2bd6e066eec5a8c5ff4838e2cc43c2e0a3e2620f2c9e9d0c259a369-1733801445501932628.gz","32397fadc2bd6e066eec5a8c5ff4838e2cc43c2e0a3e2620f2c9e9d0c259a369-1729405840159547980.gz"],"positives":45,"tags":["gzip","contains-pe","spreader"],"times_submitted":305,"type_tags":["gzip","compressed"],"vhash":"90c5bf15514532c93441e4c9364efc5a"},"relationships":{}}} | ||
| {"data":{"type":"ip_address","id":"1.128.0.0","attributes":{"gti_assessment":{"verdict":{"value":"VERDICT_MALICIOUS"},"threat_score":{"value":30},"severity":{"value":"SEVERITY_LOW"}},"asn":13335,"as_owner":"cloudflarenet","last_analysis_stats":{"malicious":1,"undetected":31,"harmless":62},"last_modification_date":1740131985,"network":"104.20.0.0/15","positives":1},"relationships":{"malware_families":{"data":[{"id":"threatfox_apk_hook","type":"collection","attributes":{"name":"hook","collection_type":"malware-family"}}]}}}} | ||
| {"data":{"type":"url","id":"13cbbd412525292fc352eae7b544f11461d11e3270b0640391239cfc639c3c5a","attributes":{"gti_assessment":{"verdict":{"value":"VERDICT_MALICIOUS"},"threat_score":{"value":60},"severity":{"value":"SEVERITY_MEDIUM"}},"categories":["not recommended site/known infection source","malicious (alphamountain.ai)","malware sites","malicious web sites"],"first_submission_date":1738281953,"last_analysis_date":1738648120,"last_analysis_stats":{"malicious":13,"suspicious":2,"undetected":24,"harmless":57},"last_http_response_code":404,"last_modification_date":1738663304,"last_submission_date":1738648120,"positives":13,"tags":["ip"],"times_submitted":2,"title":"404 not found","url":"http://185.215.113.97/files/fck_windows/random.ps1"},"relationships":{"malware_families":{"data":[{"id":"malware--cc1d563a-cf32-55e8-bae3-cbdf8266c794","type":"collection","attributes":{"name":"amadey","collection_type":"malware-family"}}]}}}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Based on the sample logs, all the data seem to be just threat indicators rather than vulnerabilities.
Can you remove event.category: vulnerability mapping ?
| /test |
|
💚 Build Succeeded
History
|
| Hello @kcreddy, |
kcreddy left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Thanks!
| Package ti_google_threat_intelligence - 0.5.0 containing this change is available at https://epr.elastic.co/package/ti_google_threat_intelligence/0.5.0/ |


Proposed commit message
This release includes five new data streams:
phishing,ransomware,threat_actor,trending, andvulnerability_weaponization. Each data stream includes its own data collection logic, ingest pipeline, and associated dashboards and visualizations.Fields are mapped to their corresponding ECS fields where applicable.
Test samples were derived from live logs and subsequently sanitized.
Checklist
changelog.ymlfile.How to test this PR locally