Google Threat Intelligence: Step 3.3 - Analysis | Threat Graph

Table of Contents

TI-Journey_Analysis_03.png

This section of Google Threat Intelligence Onboarding is going to cover the administration of Google TI’s Threat Graph. Google Threat Intelligence Graph is a visualization tool built on top of Google Threat Intelligence data set. It understands the relationship between files, URLs, domains, IP addresses and other items encountered in an ongoing investigation. With it, users can pivot intelligently over any of the malware artifacts in a user’s graph and synthesize findings into a threat map.

Prerequisites

  • Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s). 

Actions

GCSCommunity_0-1726092570312.png
Understanding Nodes & Relationships

Google Threat Intelligence’s Threat Graph is a visualization tool built on top of Google Threat Intelligence data set, that contains maps relationships between files, URLs, domains, and more. Allowing users to explore this network in an interactive graph, to discover new infrastructure and artifacts used by your adversaries

Show More
Prerequisites

Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).


Steps
  1. On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Threat Graph option in the menu.
  2. The Threat Graph page will appear. 
  3. There will be three options available:
    1. New Graph
    2. Search Query Bar
    3. Access to Graphs
  4. Users will need to understand what Nodes and Relationships are. 
  5. Each node in the graph represents an entity. There are 5 basic entity types:
    1. Files
    2. Domains
    3. URLs
    4. IP Addresses
    5. Relationship Nodes
  6. Nodes and Entities that have one or more detections from any Anti-virus system, will be marked in Red. Onces that do not, will be marked in Gray.
  7. Files are represented as a rectangular shape with a representation of the file inside. GCSCommunity_1-1726092636323.png
  8. Domains are represented using the domain favicon, if available. GCSCommunity_2-1726092655913.png
  9. URLs are represented using the following icon. GCSCommunity_3-1726092680974.png
  10. IP Addresses are represented using the flag for its country. If Google TI can’t detect the country from which the IP address is from, it will represent it as a black rectangle. GCSCommunity_4-1726092702140.pngGCSCommunity_5-1726092715758.png
  11. Relationship Nodes are represented with a circle containing a representative icon inside. GCSCommunity_6-1726092852490.pngGCSCommunity_7-1726092873010.png
  12. Each Node will have an arrow to link a Relationship Node to another Node
  13. Once a Node is selected the left panel will show the relevant information related to it.
  14. The panel will include information about the Node:
    1. Node Name
    2. Actions list
    3. Add to Collection
    4. Basic Properties
    5. Relations
    6. Detections
    7. Comments
  15. The relevant information will assist users to expand relationships, find detection verdicts, comments, etc..
  16. Multiple Nodes can be selected at the same time. There are two ways to select Multiple Nodes:
    1. Clicking on Multiple Nodes while pressing the SHIFT key. 
    2. Pressing the SHIFT key and click-dragging in the canvas.
  17. There are actions that can be performed over the selected Node. Right-clicking over a Node will show a contextual menu with the same actions that can be performed from the left panel.
  18. These actions include:
    1. Add to Collection
    2. Unpin Node
    3. Edit Label
    4. Hide Node Label
    5. Select Children
    6. Select Parents
    7. Highlight
    8. Full Expansion
    9. Add Connected Node
    10. Open Report
    11. Delete Node
  19. Relationship Nodes are a single Node that can link to Multiple Nodes. It merges actions from both single and multiple node selection.
Relevant Documentation Links
GCSCommunity_8-1726092949453.png
Searching for Threat Graphs

Google Threat Intelligence’s Threat Graph is a visualization tool built on top of Google Threat Intelligence data set, that contains maps relationships between files, URLs, domains, and more. Allowing users to explore this network in an interactive graph, to discover new infrastructure and artifacts used by your adversaries

Show More
Prerequisites

Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).


Steps
  1. On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Threat Graph option in the menu.
  2. The Threat Graph page will appear. 
  3. There will be an option to Search for Threat Graphs in a Search Query bar at the top of the page. 
  4. Users can Search by:
    1. Name
    2. Owner
    3. Description
    4. Tags
  5. Multiple entity identifiers can be searched at the same time if users press the space key between each of them.
  6. Users can Search through Threat Graphs by selecting the Access to Graphs dropdown menu below the New Graph button. GCSCommunity_9-1726092999920.png
  7. Users can select between:

    1. All Graphs (Public and Private Graphs)
    2. My Graphs
    3. My Group Graphs
Relevant Documentation Links
GCSCommunity_10-1726093025912.png
Start a New Threat Graph

Google Threat Intelligence’s Threat Graph is a visualization tool built on top of Google Threat Intelligence data set, that contains maps relationships between files, URLs, domains, and more. Allowing users to explore this network in an interactive graph, to discover new infrastructure and artifacts used by your adversaries

Show More
Prerequisites

Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).


Steps
  1. On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Threat Graph option in the menu.
  2. The Threat Graph page will appear. 
  3. Users can Start a New Threat Graph by selecting the New Graph button on the top left corner of the page. GCSCommunity_11-1726093053064.png
  4. Another option to Start a New Threat Graph is by conducting a search for an Entity in the Search Query bar. 
  5. Users will see a list of Graphs that matches the query. 
  6. When a Graph is open, user can start a New Threat Graph, by selecting an Entity or Threat Graph. Once a selection is made, users will select File tab in the top left corner of the page. 
  7. A drop down menu will appear and there will be two options, to select a New Blank Graph or New Graph from Selection.
  8. To add Nodes to an existing Threat Graph, users can:
    1. Add New Node (Top of Threat Graph)
    2. Add IOC to Collection (Left-side Panel)
      • Search a Collection
      • Add to a New Collection
    3. Add New Node (Right Click in Threat Graph)
  9. New Node Types available in the Add New Node dropdown menu includes:
    1. File
    2. Domain
    3. URL
    4. IP Address
    5. Collections
    6. Threat Actor
    7. Reference
    8. Attack Technique
    9. Attack Tactic
    10. Department
    11. Email
    12. Victim
    13. Device
    14. Port
    15. Service
    16. SSL Cert
    17. Wallet
  10. Once a New Node Type is selected, users will enter a Name for the New Node.
  11. To add the New Node to the graph, users will select Add Node.
Relevant Documentation Links

GCSCommunity_12-1726093084236.png

Find Commonalities & Start Hunting

Google Threat Intelligence’s Threat Graph is a visualization tool built on top of Google Threat Intelligence data set, that contains maps relationships between files, URLs, domains, and more. Finding common patterns is very important to an investigation and gives users the opportunity to find common patterns in a selection of nodes or even the nodes within a relationship.

Show More
Prerequisites

Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).


Steps
  1. On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Threat Graph option in the menu.
  2. The Threat Graph page will appear. 
  3. Users can find common patterns in a selection of Nodes, by selecting a Threat Graph
  4. In the Threat Graph, on the right side of the graph, users will see a toolbar that shows the status of the Commonalities depending on the node selected. GCSCommunity_14-1726093128338.png
  5. Users can also get the Commonalities for all the Children of a Relationship Node.
  6. Users will select a Relationship Node, and click Calculate Commonalities in the left drawer panel.
  7. Users can interact with Commonalities by selecting from the Commonalities Drawer, which will allow users to interact with the Threat Graph and its Commonalities.
  8. Users can select a list of Commonalities and click the button Search and Add to the Graph to perform a Google Threat Intelligence search and Aggregate the Nodes to the Threat Graph. GCSCommunity_17-1726093184374.png
  9. Users can use the Threat Graph to integrate with Live Hunt and Retrohunt Jobs by selecting the Hunt icon on the left side of the Threat Graph, below the Commonalities icon. GCSCommunity_16-1726093168410.png
  10. In the Hunting Jobs drawer, users will select from a list of Rulesets:
    1. Load Results of Graph
    2. Open Results in Hunting
    3. Launch a Retrohunt
    4. Delete a Rule
  11. In the Retrohunt Jobs drawer, users will select from a list of Retrohunt Jobs:
    1. Starting
    2. Running
    3. Aborted
    4. Aborting
    5. Finished
  12. Different action options with Retrohunt Jobs are:
    1. Load Results of Graph
    2. Open Results in Hunting
    3. Download
    4. Delete a Retrohunt
Relevant Documentation Links

Next Step: Google Threat Intelligence: Step 4 - Dissemination Overview

Previous Step: Google Threat Intelligence: Step 3.2 - Analysis | Private Scanning

Contributors
Version history
Last update:
‎12-13-2024 10:08 AM
Updated by: