Skip to main content
Question

VT and Mandiant TI threat feeds list

  • August 19, 2024
  • 8 replies
  • 139 views

Mufa_shah
Forum|alt.badge.img+4

Hi All,

Struggling to find "graph.metadata.threat.threat_feed_name"  for info stealers. Also , how to get those list of threat feeds , we can leverage. for both VT and Mandiant.

Thanks in advance  

8 replies

maxjunker
Forum|alt.badge.img+4
  • Bronze 4
  • August 22, 2024

Hi @Mufa_shah we´ve also been struggeling to find out what´s inside the global context graph. I had the privilege to attend a Google SecOps Bootcamp few months ago and I was asking the same question, but didn´t get an answer.

As of now, there´s no official documentation available. Personally I think there´s a lot happening right now as the Mandiant feeds and other open source feeds are integrated. Also Google Threat Intelligence is launching.

So I think this is a moving target. 


jstoner
Staff
Forum|alt.badge.img+22
  • Staff
  • August 22, 2024

When you say infostealer, I'm not sure what data feed that would be to point you in the right direction. Was this something someone characterized to you?

We have a few blogs on some of the threat intel sources listed below as well as some sample rules that you could use as a starting point. https://github.com/chronicle/detection-rules/tree/main/community/threat_intel

https://www.googlecloudcommunity.com/gc/Community-Blog/New-to-Google-SecOps-Detecting-Tor-Exit-Nodes-and-Remote-Access/ba-p/735064

https://www.googlecloudcommunity.com/gc/Community-Blog/New-to-Google-SecOps-Safe-Browsing-Integration/ba-p/733812

I know we need to create some more examples so happy to help clarify things but some of the content I believe may also be dependent upon the offering level selected.

Hopefully this helps as a starting point and we can evolve this further.


dnehoda
Staff
Forum|alt.badge.img+16
  • Staff
  • August 22, 2024

I believe infostealer is the malware family name.   Potentially a raw log search for infostealer or whatever their executable is may be appropriate here.   Or you could search for the hash of any of infostealers known IOC's.  

Our current capabilities do not support graph entity searches.  This is an upcoming feature I believe.  

 


hzmndt
Staff
Forum|alt.badge.img+9
  • Staff
  • August 22, 2024

So i'm thinking if you can ask support to grant you the Chronicle bigquery access, then you can select the data from the bigquery table for all the threat_feed_name  & dump out from there. 


Aj_Detection
Forum|alt.badge.img+3
  • Bronze 1
  • November 27, 2025

So i'm thinking if you can ask support to grant you the Chronicle bigquery access, then you can select the data from the bigquery table for all the threat_feed_name  & dump out from there. 


Hi ​@jstoner  is this possible . if we get the access to big query ? can we able to see the values of field graph.metadata.

Thanks

Ajay P


jstoner
Staff
Forum|alt.badge.img+22
  • Staff
  • December 1, 2025

Because you can perform a search of global context data in search, I would suggest that if you are looking to explore the entity graph and the data sets you have access to, a good way to do that is performing a search like this.

 

graph.metadata.source_type = "GLOBAL_CONTEXT"
graph.metadata.entity_type = "FILE"
graph.metadata.vendor_name = "MANDIANT_FUSION_IOC"
graph.metadata.threat.associations.type = "MALWARE"
graph.metadata.threat.associations.role = "Credential Stealer"
select:
graph.metadata.vendor_name, graph.metadata.product_name, graph.metadata.feed, graph.metadata.threat.threat_feed_name

The fields in the select section can also be useful for narrowing the data down but the one I included in the first half of the search is specific to Mandiant Fusion IOC feeds.


Aj_Detection
Forum|alt.badge.img+3
  • Bronze 1
  • December 3, 2025

Hi ​@jstoner 

Thanks for your response. Am not getting any data with the provided query for GLOBAL_CONTEXT. Have executed with different values as well.

 


Regards

Ajay P

Detection Engineering


jstoner
Staff
Forum|alt.badge.img+22
  • Staff
  • December 3, 2025

Give this a try:

graph.metadata.source_type = "GLOBAL_CONTEXT"
graph.metadata.entity_type = "FILE"
graph.metadata.vendor_name = "Google Cloud Threat Intelligence"
select:
graph.metadata.vendor_name, graph.metadata.product_name, graph.metadata.feed, graph.metadata.threat.threat_feed_name

Depending on the entitlement of the tenant, the Mandiant Fusion feed may not be available. Below is a summary of some of the other feeds that you should have access to separate from the that Mandiant feed. If you aren’t seeing anything with this or are expecting to see the Fusion feed based on your entitlement, you may need to open a ticket to see if that can get resolved.

https://docs.cloud.google.com/chronicle/docs/event-processing/data-enrichment#ingest-and-store-gcp-threat-intelligence-data