icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Google Threat Intelligence App for Splunk
SHA256 checksum (google-threat-intelligence-app-for-splunk_143.tgz) 2eb19a861103a1e09fb9dc93f1339509b55e609fcc4f8e391c53ea765ea3d542 SHA256 checksum (google-threat-intelligence-app-for-splunk_142.tgz) 1cd8386640bdb773c54c1b09ef675456d5e61e8c0bbacd49c14c52154ebb361a SHA256 checksum (google-threat-intelligence-app-for-splunk_130.tgz) 6b09e5c21ade71b6bd99818f3667c28fe6b4c223bdd089e8d5bdd6894fc3262f SHA256 checksum (google-threat-intelligence-app-for-splunk_121.tgz) 395e32edf102eb3c4ce9630a9a880a65ef3fee6f61f4c32e9ae42f12fd34d1b8 SHA256 checksum (google-threat-intelligence-app-for-splunk_120.tgz) 5564e054bbb7b3fcae5e4b192e48a520fa92d3494bde0c5fe5cfc5afbbbc8687 SHA256 checksum (google-threat-intelligence-app-for-splunk_114.tgz) 69f37e10af44b784110faa04570335fc483ea12c3779cf77bbe1c56b40f9be02 SHA256 checksum (google-threat-intelligence-app-for-splunk_113.tgz) 898fa9e18e321b895ced7544093a3a2671b7f3816bf56f43760224764ae4af8e SHA256 checksum (google-threat-intelligence-app-for-splunk_112.tgz) 7b92330085fc4195410618096d4e5cef832c829f9a5d2b92193fe29361202c6b SHA256 checksum (google-threat-intelligence-app-for-splunk_111.tgz) 402d99eca77f0a013b4923c01d53edf37f7e04b9b0b44340e58c1d472b3ad1a3 SHA256 checksum (google-threat-intelligence-app-for-splunk_110.tgz) ad8392aebe98204db2d719e9f8a29a45a76f40c36e4d0f2976eb12cd3e639bf3 SHA256 checksum (google-threat-intelligence-app-for-splunk_104.tgz) 438273a219cd56758b6b804fa95b9b3ca14ebb19d2bc0c80f510acba7626615b SHA256 checksum (google-threat-intelligence-app-for-splunk_103.tgz) fed1ab80b7fc39cdf1f5b59af4bfd0e05113a26dd877094d873a4c0c3da11ac9 SHA256 checksum (google-threat-intelligence-app-for-splunk_102.tgz) 4d3b5bdd1fded7faa367c8626db1cbea18b5a59ea206202da02268a6439a0da2 SHA256 checksum (google-threat-intelligence-app-for-splunk_101.tgz) 12636178652901a24df83c40eb8a86713e1d596e58396755bcca4f52925b6b4a SHA256 checksum (google-threat-intelligence-app-for-splunk_100.tgz) 3362dee7d96d3c928a2e7081e40e21358bd20436f8bed71948aa27b66b5cf664
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Google Threat Intelligence App for Splunk

Splunk Cloud
Overview
Details
Google Threat Intelligence provides unparalleled visibility into the global threat landscape. We offer deep insights from Mandiant’s leading incident response and threat research team, and combine them with our massive user and device footprint and VirusTotal’s broad crowdsourced malware database.

Google Threat Intelligence App for Splunk

Overview

Google Threat Intelligence automatically enriches your Splunk logs with curated and crowdsourced threat intelligence data. It allows you to contextualize IoCs (files/hashes, domains, IP addresses, URLs) and confirm malicious intent/discard false positives. The context added includes: Gogle Threat Intelligence score, security industry reputation, severity, threat categories and labels, associated campaigns and threat actors, etc.

Compatibility Matrix

  • Unix OS
  • Splunk version: 9.4.x, 9.3.x ,9.2.x, 9.1.x, 9.0.x
  • Python version: Python3

Installation

GTI app can be installed through UI as is shown below:

  1. Log in to Splunk Web and navigate to Apps > Manage Apps.
  2. Click Install app from file.
  3. Click Choose file and select the TA-gti-app installation file.
  4. Click on Upload.
  5. Restart Splunk.

By the limitations of Splunk at the time of reading the API key from indexers GTI app will always run on the Search Head so the add-on it only needs to be installed on the Search Head as usual, not on the indexers nor in the forwarders.

Configuration

Configuring GTI:

Proxy

Configure proxy settings:

Enable Proxy Optional To enable or disable the proxy
Proxy Host Mandatory Host or IP of the proxy server
Proxy Port Mandatory Port for proxy server
Proxy Username Optional Username of the proxy server
Proxy Password Optional Password of the proxy server

Logging

Configure the Logging level:

  1. Navigate to the Configuration tab.
  2. Click on the Logging tab.
  3. Select the log level click on Save.

General Settings

Configure basic values for the correct operation of the app:

To test the connection you can execute this Splunk query after save the API key

| makeresults
| eval testip="8.8.8.8"
| gti ip=testip
  • Lookup table expiration (days):
    Elements stored in the lookup tables (iocs, campaigns, actors) will be removed when the last time they are seen in the events exceeds this value.

Correlation Settings

Configure values which will affect to the automatic correlation and the data shown in the dashboards:

  • Enable automatic correlation:
    Enable this to automatically correlate IoCs found in your events with Google Threat Intelligence context. GTI enrichment will be scheduled every 30 minutes and findings will be summarized in the dashboards.

  • Data freshness (days):
    Optimizes your Google Threat Intelligence API quota. IoC enrichment will be retrieved from the local cache, instead of performing an API call, whenever the cached analysis' age is lower than this value.

  • Names for indexes:
    Automatic correlation and dashboards will use this list of indexes to perform the search of the events in your catalog.

  • Fields names [Hash, URL, Domain, IP]:
    Saved searches will perform automatic correlation using these field names to find IoCs in your events. Empty field disables that automatic correlation specifically.

Commands

The app provides a main command gti to correlate IoCs found in your events with the Google Threat Intelligence information, also provides other commands to keep up-to-date the enrichment dataset:

  • gti:

Adding the command to a SPL query will enrich events which contains the fieldname passed as argument, adding new fields to the event in search time with the prefix gti_, the command admits the following parameters:

Parameter Optional Description
hash | domain | url | ip No event fieldname
nocache Yes Boolean lowercase value [true | false]

Query examples:

sourcetype=access_* status=400 method=POST
| gti ip=clientip

Correlate clientip field of access log events.

sourcetype=access_* status=400 method=POST
| gti ip=clientip nocache=true

Forcing to get the enrichment data from Google Threat Intelligence instead of the lookup tables.

sourcetype=access_* status=400 method=POST
| gti ip=clientip nocache=true
| search gti_detections > 10

Get correlated events where detections are more than ten.

Additional commands

The following additional commands are executed periodically by the saved searches, it rarely will be necessary to execute manually.

  • gtideleteiocs:

Delete IoCs older than 30 days by default. It can be also executed manually given a table with gti_id field as input and/or with some parameter to perform a more selective delete:

Parameter Optional Description
lookups Yes delete iocs of specific types (hash, domain, ip, url)
ttl Yes delete iocs older than this value (days)

Query examples:

| makeresults | gtideleteiocs

Delete all IoCs.

| makeresults | gtideleteiocs ttl=30

Delete all IoCs older than 30 days.

| inputlookup gti_url_cache | search gti_detections < 10 | gtideleteiocs lookups=url ttl=5

Delete URLs with less than 10 detections and older than 5 days.

| inputlookup gti_file_cache | search gti_tags=*cve-* | gtideleteiocs lookups=hash

Delete hashes with CVE tags.

  • gtiadversaryupdate:

Keep up-to-date campaigns and threat actors.

  • gtimitreupdate:

Extract MITRE information of each hash and keep up-to-date the dashboard.

Saved Searches

The app provides tool for creating and managing saved searches that will correlate your events and will keep the data up-to-date in an unmanaged way.

The saved searches are in charge of the automatic correlation, they will inspect new events in the last 15 minutes contained only in the indexes configured in the Correlation Settings.

  • GTI Clean Lookups

This saved search will remove IoCs from the lookup tables older than the value configured in the Correlation Settings, by default 30 days.

  • GTI Keep Adversary Lookups Updated
  • GTI Keep MITRE Lookup Updated

The above saved searches keep up-to-date the data shown in the Vulnerability, Adversary and MITRE dashboards.

Lookup tables

The app creates several lookup tables to store the enrichment data and to feed the dashboards:

  • gti_file_cache: store the Google Threat Intelligence enrichment data for files
  • gti_domain_cache: store the Google Threat Intelligence enrichment data for domains
  • gti_url_cache: store the Google Threat Intelligence enrichment data for urls
  • gti_ip_cache: store the Google Threat Intelligence enrichment data for ips
  • gti_collection_cache: store the Google Threat Intelligence collections for flagged iocs (Campaigns and malware toolkits)
  • gti_mitre_cache: store the MITRE information for files
  • gti_ignore_cache: store the IoCs to be ignored in the dashboards

All of the above tables can be inspected running a search query like this: | inputlookup gti_file_cache.

Ignoring specific IoCs

IoCs can be ignored adding them to a specific lookup table, preventing them from appearing in the dashboards, this can be useful if you have a well-known or false positives IoCs.

You can manage those IoCs with these queries: * To add a single IoC:

| makeresults | eval gti_id="eed999fcf63eaa5dd73fac49a7d49d64fe19b945eb30730da4ab026d78746559", gti_type="hash"
| outputlookup append=true gti_ignore_cache
  • To add multiple IoCs:
| makeresults format=csv data="gti_id, gti_type
eed999fcf63eaa5dd73fac49a7d49d64fe19b945eb30730da4ab026d78746559,hash
google.com,domain
https://www.google.com,url
127.0.0.1,ip"
| outputlookup append=true gti_ignore_cache
  • To remove duplicate IoCs:
| inputlookup gti_ignore_cache | dedup gti_id gti_type | outputlookup gti_ignore_cache

Troubleshooting

Empty dashboards

  • Saved searches only correlate events created in the last 30 minutes, if you want to do a backfill to start showing data perform a search adding the command gti as described above.

  • Check lookup tables have information, if not try to execute the gti command manually over a search of events.

  • Check the index names in the Correlation Settings.

Configuration tab is not loading

  • Some specific versions of Splunk may have some problems reading the passwords.conf file, leading to Configuration tab not loading. To solve this you have to delete the passwords.conf file and try again, you can found it accessing to your Splunk instance in the following path $SPLUNK_HOME/etc/apps/TA-gti-app/local/passwords.conf.

I cannot see the correlations settings.

The correlations settings is now on its own page, click on the Configuration menu and select the Correlations menu entry.

Attention Splunk 9.3 users. This version has an acknowledged bug by which the add-on navigation bar does not refresh after an add-on upgrade. To overcome this, please, open the browser developer tools, locate the local storage (In Chrome: Application tab -> Local Storage left menu) filter by TA-gti-app, remove the splunk-appnav:TA-gti-app entry and refresh the page.

Support

  • Email contact@virustotal.com

  • When contacting to support, please indicate your Google Threat Intelligence version, Splunk version, if Enterprise or Cloud, and some screenshots and logs by executing:

index=_internal | search source="*ta_gti_app*"

To get all logs stored by GTI.

index=_internal log_level=ERROR

To get all error logs.

Migration from VT4Splunk

This add-on has been designed to mimic the behavior of VT4Splunk as closely as possible to facilitate migration from it.

  • The main enrichment command is called gti (former vt4splunk).
  • The commands vtdeleteiocs, vtadversaryupdate, vtvulnerabilitiesupdate, vtmitreupdate are now called gtideleteiocs, gtiadversaryupdate, gtivulnerabilitiesupdate, gtimitreupdate.

Copyright (c) 2024 Google. All rights reserved.

Binary File Declaration

/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/pvectorc.cpython-37m-x86_64-linux-gnu.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/markupsafe/_speedups.cpython-37m-x86_64-linux-gnu.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/cli-arm64.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/cli-64.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/gui-64.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/cli.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/cli-32.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/gui-32.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/gui.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/ta_gti_app/aob_py3/setuptools/gui-arm64.exe: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/aiohttp/_websocket.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/aiohttp/_helpers.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/aiohttp/_http_parser.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/aiohttp/_http_writer.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/frozenlist/_frozenlist.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/charset_normalizer/md__mypyc.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/charset_normalizer/md.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/multidict/_multidict.cpython-39-darwin.so: this file does not require any source code
/Applications/Splunk/var/data/tabuilder/package/TA-gti-app/bin/lib/yarl/_quoting_c.cpython-39-darwin.so: this file does not require any source code

Release Notes

Version 1.4.3
July 17, 2025

Version: 1.4.3

  • Optimized the CVE ingestion process, reducing data collection time by approximately 50%
  • The target index for CVE data ingestion is now customizable, providing greater flexibility for data management.
Version 1.4.2
July 10, 2025

Version: 1.4.2

  • Ingest CVEs: Easily bring in the latest vulnerability data.
  • Automatic Matching: Correlate ingested vulnerabilities with your scan results.
  • New Dashboards:
    • Vulnerability Overview: See all vulnerabilities by risk and exploitation status.
    • Vulnerability Details: View information about affected hosts.
    • Ingestion Stats: Monitor your ingested intelligence.
Version 1.3.0
May 7, 2025

Version: 1.3.0

Version 1.2.1
April 3, 2025

Version: 1.2.1

  • Get the management port from the Splunk configuration instead of the default.
Version 1.2.0
March 12, 2025

Version: 1.2.0

  • Add view-context documentation in each panel of the integration
  • Add support for ingesting Threat Lists as modular inputs https://gtidocs.virustotal.com/reference/list-provisioned-threat-lists
  • Implement an update mechanism for saved searches, prompting users to update queries that are not aligned with the latest add-on version. This ensures all searches leverage the most current functionality.
Version 1.1.4
March 4, 2025

Version: 1.1.4

  • Python 3.7 dependencies have been updated.
  • Optimized search query for basic correlations.
  • De-duplicate IoCs in basic correlations to avoid extra calls to GTI API.
Version 1.1.3
Feb. 4, 2025

Version: 1.1.3

  • Update Splunk SDK for python.
Version 1.1.2
Dec. 20, 2024

Version: 1.1.2

  • New CIM data models correlations.
Version 1.1.1
Dec. 3, 2024

Version: 1.1.1

  • Fix search in events action bug when button 'Search' is clicked.
Version 1.1.0
Nov. 28, 2024

Version: 1.1.0

  • A new dashboard to manage correlations allows users to define their own correlations, giving them greater control over the index and the fields used by each correlation.
  • Add granular controls to enable/disable correlations individually.
  • The basic correlation saved searches performance has been improved.
  • The basic correlation saved searches execution interval has been reduced from 30 to 15 minutes.

Upgrade from version 1.0.4

  • Execute the following command to keep up to date your threat actors.
| gtiadversaryupdate
Version 1.0.4
Oct. 21, 2024

Version: 1.0.4

  • The performance of the gti command has been drastically improved.
  • The MITRE ATT&CK techniques tab from Adversary Intelligence has been moved to the MITRE ATT&CK dashboard.
  • The Events drilldown tables have been replaced by a Splunk Search action, allowing users to have more control by refining the search query to match the IoCs in their events.
  • The Adversary Intelligence dashboard now displays individual tables for campaigns, malware, toolkits and collections."
Version 1.0.3
Aug. 2, 2024

Version: 1.0.3

  • Fix Adversary dashboard bug where Threat actors were not being listed
  • Add GTI assessment (threat score, severity and verdict) data to IoCs in all dashboards
  • Add a new role called gti which allows users to use the add-on but preventing them from editing settings
Version 1.0.2
July 16, 2024

Version: 1.0.2

  • Fix settings correlation error when saved searches are saved
Version 1.0.1
July 15, 2024

Version: 1.0.1

  • Added partner and crowdsourced origin selector in Adversary dashboard for Standard Google TI package
  • Added partner, crowdsourced and Google Threat Intelligece origin selector for Enterprise Google TI package
  • Fix MITRE matrix content
Version 1.0.0
May 6, 2024

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.