How to get SIEM IOC Matches into SOAR

Hello all, 

there is no current post regarding this topic, so I open a new post. 
Is there any chance to ingest the IOC Matches from Google SIEM into Google SOAR as a new alert / case. 
In the past I thought there was a connector function which allowed to directly create alerts based on the IOC Matches. 
Or are there anywhere public IOC Detection Rules, which are reporting exactly the IOC Matches.

MarinusC_0-1728916055884.png

Thank you for your help.
~Marinus

0 3 1,428
3 REPLIES 3

Have you tried the Madiant Threat Intelligence integration? 

You could also download the CSV from your screenshot, then import that in a custom list.

Thank you for your answer.
But, the Mandiant Threat Intelligence integration won´t solve this issue, you can enrich existing entities in SOAR.
To import the CSV in a list for a rule and search for detections is also not a proper solution. 
It is manual work and not proactive.

You can do it with a detection rule that matches the IOC data with your UDM events.

dlove40_0-1730404373920.png