Skip to main content

We are excited to announce the release of our Google Threat Intelligence Cheat Sheet. Designed as a quick reference guide, this cheat sheet provides hints and examples of some of the most useful intelligence searches available in Google Threat Intelligence.


For a security analyst, being able to build these searches efficiently is essential to quickly identify, analyze and track the latest threats, ultimately helping to protect organizations. 


By combining entities (the type of item you're searching for)  and other modifiers (specific attributes or characteristics of that entity), we can craft highly targeted queries to find the critical intelligence needed for our investigation and defense efforts. Here's how you can construct these search queries:



  • Specify the Entity Type: You must start by defining the type of item you are searching for using the entity modifier. Common entity types are: file, URL, domain, IP address and collection

  • Use Modifiers to Refine Your Search: Each entity type has specific modifiers you can use (files, URLs, domains, IP addresses and collections). These modifiers allow you to search based on different criteria. 


Let’s see some basic examples of searches using each entity modifier:



Please note that by default, if you don't add the entity at the beginning of the query, you'll only get results related to files.



  • Combine Boolean operators (AND, OR, NOT, or none of them which is equivalent to AND) as well as parentheses, with search modifiers for more complex searches.


Let’s provide you some examples of specific searches helpful for security researchers and analysts organized in different sections:


DOCUMENTS: 


Let's start by searching for documents. Common types like PDFs, DOCs, and XLSs are frequent malware delivery vectors, and require thorough investigation. Remember, searches default to entity:file. This means you don't need to add entity:file for the document queries (which are file searches) shown below—it's simply optional. These examples demonstrate how to pinpoint suspicious files by their defining traits:



BEHAVIOR: 


Static analysis tells part of the story; behavioral analysis reveals the plot. The queries in this section are designed to search the dynamic actions of files executed in an automated sandbox. This provides a much deeper understanding of malware's capabilities and objectives. Let’s see more examples:



NETWORK AND INFRASTRUCTURE: 


This section focuses on identifying suspicious URLs and IP addresses,critical for mapping out threat actor infrastructure, finding command-and-control (C2) servers, and identifying malware distribution points. Let’s see some examples:



APT DETECTION AND TRACKING: 


This section is specifically tailored for identifying and tracking activities linked to Advanced Persistent Threats (APTs) or sophisticated malware. The examples provided help analysts follow the digital breadcrumbs left by these actors:



In conclusion, by combining these entities and modifiers, you can create specific queries to find the intelligence you need within our Google Threat Intelligence platform. Remember to check other interesting examples provided in the PDF version. 


Happy Hunting! 


Be the first to reply!

Reply