Dataminr Pulse CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
| Current Integration Version | 1.1.0 |
| Compatible with ThreatQ Versions | >= 5.22.0 |
| Support Tier | ThreatQ Supported |
Introduction
The Dataminr Pulse CDF enables the automatic ingestion of alerts from Dataminr Pulse portal into ThreatQ. Dataminr Pulse contains alerts on activity across multiple publicly available sources. The alerts are ingested as ThreatQ events.
The integration provides the following feeds:
Both feeds ingest the same alerts. Select one based on your organization's Client ID and Secret.
- Dataminr Pulse Alerts - ingests Dataminr Pulse Alerts into ThreatQ as events.
- Dataminr Real-time Pulse Alerts
The integration ingests the following system objects:
- Adversaries
- Events
- Event Attributes
- Indicators
- Indicator Attributes
- Malware
- Vulnerabilities
- Vulnerability Attributes
Prerequisites
The following is required to use the integration:
- Dataminr Pulse Alerts:
- Dataminr Pulse Client ID and Secret. Contact Dataminr for the credentials
- Dataminr Real-time Pulse Alerts:
- Dataminr Pulse Real Time API Client ID and Secret. More information can be found here: APIs -> Authentication API https://developer.dataminr.com/s/asset-catalog
- At least one valid Alert List must be configured on the account before using this integration.
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the integration file on your local machine
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- The feed will be added to the integrations page. You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Dataminr Pulse Alerts
Parameter Description Client ID Your Client ID used to authenticate with the Dataminr Pulse API. Client Secret Your Client Secret used to authenticate with the Dataminr Pulse API. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Dataminr List If specified, the feed ingests only alerts belonging to the specified list from Dataminr application. Alert Type Filter data ingested into the platform by Alert Type. Options include: - All
- Flash
- Urgent
- Alert
Title Data Field Select the data field to use in the alert title - Headline (default)
- Alert ID
Ingest Parent Alert When enabled the feed ingests and relates the parent alert even if it does not satisfy the previously configured filters. Metadata Objects When enabled, the feed will ingest the selected related objects. Options include: - Addresses
- URLs
- Vulnerabilities
- Adversary
- Malware
- Hashes
Network Scans, Phishing, Malware and Domain Impersonation Categories - only Addresses and URLs will be ingested if selected.
Alert Reference Terms for Addresses and URLs Enter a comma-separated list of reference terms. Only alerts containing these terms will have their related Addresses and URLs ingested. Leave it empty to always ingest Addresses and URLs. (default: phishing, malicious, impersonation) ASN Metadata When enabled, the feed will ingest the selected metadata as Address and URL attributes. Options include: - ASN (default)
- ASN Organization (default)
Ingest CVEs As Select the ThreatQ object type to ingest the CVEs into ThreatQ as. Options include: - Vulnerabilities (default)
- Indicators
Vulnerabilities Context When enabled, the feed will ingest the selected metadata as Vulnerability attributes. Options include: - CVSS Score (default)
- EPSS Score
- Products affected (default)
- Vendors
- Exploit POC links
Set indicator status to... Select the status to apply to indicators.

Dataminr Real-time Pulse AlertsParameter Description Client ID Your Client ID used to authenticate with the Dataminr Real-time Pulse API. Client Secret Your Client Secret used to authenticate with the Dataminr Relal-time Pulse API. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Dataminr List If specified, the feed ingests only alerts belonging to the specified list from Dataminr application. Alert Type Filter data ingested into the platform by Alert Type. Options include: - All
- Flash
- Urgent
- Alert
Title Data Field Select the data field to use in the alert title - Headline (default)
- Alert ID
Ingest Parent Alert When enabled the feed ingests and relates the parent alert even if it does not satisfy the previously configured filters. Metadata Objects When enabled, the feed will ingest the selected related objects. Options include: - Addresses
- URLs
- Vulnerabilities
- Adversary
- Malware
- Hashes
Network Scans, Phishing, Malware and Domain Impersonation Categories - only Addresses and URLs will be ingested if selected.
Alert Reference Terms for Addresses and URLs Enter a comma-separated list of reference terms. Only alerts containing these terms will have their related Addresses and URLs ingested. Leave it empty to always ingest Addresses and URLs. (default: phishing, malicious, impersonation) ASN Metadata When enabled, the feed will ingest the selected metadata as Address and URL attributes. Options include: - ASN (default)
- ASN Organization (default)
Ingest CVEs As Select the ThreatQ object type to ingest the CVEs into ThreatQ as. Options include: - Vulnerabilities (default)
- Indicators
Vulnerabilities Context When enabled, the feed will ingest the selected metadata as Vulnerability attributes. Options include: - CVSS Score (default)
- EPSS Score
- Products affected (default)
- Vendors
- Exploit POC links
Set indicator status to... Select the status to apply to indicators. 
- Enter the following parameters under the Configuration tab:
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Dataminr Pulse Alerts
The Dataminr Pulse Alerts feed ingests Dataminr Pulse Alerts into the ThreatQ platform as events.
GET https://gateway.dataminr.com/account/2/get_lists
The feed retrieves all the IDs (.watchlists.{{CATEGORY}}.id) for the lists configured in Dataminr Portal. The IDs are sent to the supplemental feeds Dataminr Get Next Alerts, Dataminr Get Previous Alerts to get the needed alerts.
Sample Response:
{
"watchlists": {
"TOPIC": [
{
"id": 4153708,
"properties": {
"watchlistColor": "darkblue"
},
"name": "Government",
"description": "",
"type": "TOPIC"
}
],
"COMPANY": [
{
"name": "Top Companies",
"companies": [
{
"id": "e7a463003d6229c750586f8a263ec4e0",
"name": "YUM! Brands, Inc."
}
],
"description": "",
"type": "COMPANY",
"id": 4153722,
"properties": {
"watchlistColor": "darkblue"
}
}
],
"CUSTOM": [
{
"id": 4177550,
"properties": {
"watchlistColor": "darkblue"
},
"name": "Exploits",
"description": "",
"type": "CUSTOM"
}
]
}
}
Dataminr Supplemental Feeds
The integration utilizes three supplemental feeds: Dataminr Get Next Alerts, Dataminr Get Previous Alerts, Dataminr Get Related Alerts.
The Dataminr API has a cursor based implementation. Dataminr Get Next Alerts retrieves the alerts that Dataminr considers as new alerts for the user. Dataminr Get Previous Alerts retrieves the alerts that are considered old/read. If user config Ingest related alerts is enabled, the feed Dataminr Get Related Alerts ingested the related alerts for each entry.
Dataminr Get Next Alerts, Dataminr Get Previous Alerts - GET https://gateway.dataminr.com/api/3/alerts
Dataminr Get Related Alerts - GET https://gateway.dataminr.com/alerts/2/get_related?id={{ALERT_ID}}
Sample Response:
{
"data": {
"alerts": [
{
"alertId": "1407810963-1701783539058-3",
"alertType": {
"id": "urgent",
"name": "Urgent",
"color": "FFBB05"
},
"watchlistsMatchedByType": [
{
"id": "4177550",
"type": "CUSTOM",
"name": "Exploits",
"externalTopicIds": [],
"userProperties": {
"omnilist": "true"
}
}
],
"availableRelatedAlerts": 0,
"eventTime": 1701783733823,
"eventVolume": 0,
"metadata": {
"cyber": {
"vulnerabilities": [
{
"id": "CVE-2023-49105",
"cvss": 9.8,
"products": [
{
"productName": "owncloud",
"productVersion": " ",
"productVendor": "owncloud"
}
],
"exploitPocLinks": []
}
],
"URLs": [
"ambionics.io"
],
"addresses": [
{
"ip": "148.72.164.186",
"port": "80"
}
],
"asns": [],
"orgs": [],
"hashes": [],
"products": [],
"malwares": [],
"threats": [],
"asOrgs": [
{
"asn": "AS13335",
"asOrg": "Cloudflare"
}
],
"hashValues": []
}
},
"caption": "CVE-2023-49105 referenced on X (formerly Twitter)",
"subCaption": {
"bullets": {
"content": "Philip Morris mentioned in headline\nSampoerna and Philip Morris International mentioned in article",
"source": "According to Capital Romanian"
}
},
"companies": [
{
"name": "Apple Inc.",
"topicType": "company",
"id": "2adac6e9b077021a8c4e5de1a3aa057b",
"idStr": "2adac6e9b077021a8c4e5de1a3aa057b",
"ticker": "\"apple+\"",
"retired": false
}
],
"categories": [
{
"name": "Cybersecurity",
"topicType": "category",
"id": "124022",
"idStr": "124022",
"path": "/TOPIC/EXT/CS/124022",
"retired": false
}
],
"eventLocation": {
"coordinates": [
37.3318598,
-122.0302485
],
"name": "Apple Inc. HQ, Cupertino, CA, USA",
"places": [
"8e51ba12f754ae46a6ec7816d6e7a617",
"f66b10a1b6d5d260b3ddb7e7518aa5ac",
"2f7245ea29c7d5a90bfd48512f971ef0",
"0a269a52d33a19cd680c4d33aef9a4af",
"4e9ea3cb3310c59405b5cd3844856d12"
],
"probability": 0.0,
"radius": 0.1
},
"sectors": [],
"headerColor": "FFFFAD",
"publisherCategory": {
"id": "chatter",
"name": "Chatter",
"color": "A24512",
"shortName": "CTR"
},
"expandAlertURL": "https://app.dataminr.com/#alertDetail/5/1407810963-1701783539058-3",
"expandUserURL": "https://app.dataminr.com/#userDetail/@ambionics",
"relatedTerms": [
{
"text": "exploit",
"url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22exploit%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22exploit%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
},
{
"text": "referenced",
"url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
}
],
"relatedTermsQueryURL": "https://app.dataminr.com/#search-popup/search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D",
"userRecentImages": [],
"userTopHashtags": [],
"post": {
"timestamp": 1701788203472,
"languages": [],
"media": [],
"link": "https://www.axios.com/2023/12/05/us-israeli-settler-west-bank-visa-ban-plan"
},
"source": {
"verified": false,
"displayName": "Axios",
"channels": [
"news"
]
}
}
]
}
ThreatQuotient provides the following default mapping for this feed:
The following information is added to the description of the Event:
.headline.subHeadline.title.subHeadline.content[].publicPost.media[].href.dataminrAlertUrl
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
| .data.alerts[].caption | Event.Title | N/A | .data.alerts[] .eventTime |
Dataminr Alert: CVE- 2023-49105 referenced on X (formerly Twitter) |
Prepended with Dataminr Alert:.If Title Data Field equals Caption |
| .data.alerts[].alertId | Event.Title | N/A | .data.alerts[] .eventTime |
Dataminr Alert: 1407810963- 170 1783539058-3 |
Prepended with Dataminr Alert:. If Title Data Field equals Alert ID |
| .data.alerts[].subCaption. bullets +.data.alerts[] .post.media[].url |
Event.Description | N/A | N/A | According to Capital Romanian hilip Morris mentioned in headline... |
N/A |
| .data.alerts[].available RelatedAlerts |
Event.Attribute | Available Related Alerts |
.data.alerts[] .eventTime |
0 | Updated if already exists |
| .data.alerts[].eventLocation .coordinates[0] |
Event.Attribute | Latitude | .data.alerts[] .eventTime |
37.33 | Rounded to 2 decimals |
| .data.alerts[].eventLocation .coordinates[1] |
Event.Attribute | Longitude | .data.alerts[] .eventTime |
-122.0 | Rounded to 2 decimals |
| .data.alerts[].eventLocation .name |
Event.Attribute | Location | .data.alerts[] .eventTime |
Apple Inc. HQ, Cupertino, CA, USA |
N/A |
| .data.alerts[].post.link | Event.Attribute | Post Link | .data.alerts[] .eventTime |
https://www.axios.com/ 2023/12/ 05/us-israeli-settler-west-bank-visa -ban-plan |
N/A |
| .data.alerts[].source. verified |
Event.Attribute | Is Source Verified | .data.alerts[] .eventTime |
False | Updated if already exists |
| .data.alerts[].source. display Name |
Event.Attribute | Source | .data.alerts[] .eventTime |
Axios | N/A |
| .data.alerts[].source. channels |
Event.Attribute | Source Channel | .data.alerts[] .eventTime |
Major News | See Channel Mapping Table |
| .data.alerts[].alertType. name |
Event.Attribute | Alert Type | .data.alerts[] .eventTime |
Urgent | N/A |
| .data.alerts[].companies[] .name |
Event.Attribute | Company | .data.alerts[] .eventTime |
Apple Inc. | N/A |
| .data.alerts[].categories[] .name |
Event.Attribute | Category | .data.alerts[] .eventTime |
Cybersecurity | N/A |
| .data.alerts[].watchlists MatchedBy Type[].name |
Event.Attribute | Dataminr Watchlist Name | .data.alerts[] .eventTime |
Exploits | N/A |
| .data.alerts[].expandAlert URL |
Event.Attribute | Dataminr Alert URL | .data.alerts[] .eventTime |
https://app.dataminr.com /#alert Detail/5/1407810963-1701783539058-3 |
N/A |
| .data.alerts[].metadata. cyber .vulnerabilities[].id |
Related Indicator/ Vulnerability.Value |
CVE/ N/A | .data.alerts[] .eventTime |
CVE-2023-49105 | Ingested according to Ingest CVEs As... config |
| .data.alerts[].metadata. cyber .vulnerabilities[].cvss |
Related Indicator/ Vulnerability.Attribute |
CVSS Score | .data.alerts[] .eventTime |
9.8 | If "CVSS score" checked in "Vulnerabilities Context" . Updated if already exists |
| .data.alerts[].metadata. cyber. vulnerabilities[] .products[].productName |
Related Indicator/ Vulnerability.Attribute |
Product | .data.alerts[] .eventTime |
owncloud | if "Products affected" checked in "Vulnerabilities Context" |
| .data.alerts[].metadata. cyber. vulnerabilities[] .products[].productVendor |
Related Indicator/ Vulnerability.Attribute |
Vendor | .data.alerts[] .eventTime |
owncloud | if "Vendors" checked in "Vulnerabilities Context" |
| .data.alerts[].metadata. cyber. vulnerabilities[] .exploitPocLinks[] |
Related Indicator/ Vulnerability.Attribute |
Exploit POC Link | .data.alerts[] .eventTime |
N/A | If "Exploit POC links" checked in "Vulnerabilities Context" |
| .data.alerts[].metadata. cyber .addresses[].ip |
Related Indicator.Value | IP Addresss | .data.alerts[] .eventTime |
148.72.164.186 | Ingests IP Address IOCs, if "Addresses" checked in "Metadata Objects", if category is one of:"Network Scans", "Phishing", "Malware", "Domain Impersonation" |
| .data.alerts[].metadata. cyber .addresses[].port |
Related Indicator.Attribute | Port | .data.alerts[] .eventTime |
80 | N/A |
| .data.alerts[].metadata. cyber.URLs[] |
Related Indicator.Value | FQDN | .data.alerts[] .eventTime |
ambionics.io | Ingests URL IOCs, if "URLs" checked in "Metadata Objects", if category is one of: "Network Scans", "Phishing", "Malware", "Domain Impersonation" |
| .data.alerts[].metadata. cyber. asOrgs[].asn |
Related Indicator.Attribute | ASN | .data.alerts[] .eventTime |
AS13335 | For Addresses and URLs, if "ASN" checked in ASN Metadata |
| .data.alerts[].metadata. cyber .asOrgs[].asOrg |
Related Indicator.Attribute | ASN Organization | .data.alerts[] .eventTime |
Cloudflare | For Addresses and URLs, if "ASN Organization" checked in "ASN Metadata" |
| .data.alerts[].metadata. cyber .hashValues[].hash |
Related Indicator.Value | .data.alerts[]. metadata.cyber .hashValues[].type |
.data.alerts[] .eventTime |
N/A | Ingests Hash IOCs, if "Hashes" checked in "Metadata Objects" |
| .data.alerts[].metadata. cyber .malwares[] |
Related Malware.Value | N/A | .data.alerts[] .eventTime |
N/A | If "Malware" checked in "Metadata Objects" |
| .data.alerts[].metadata. cyber .threats[] |
Related Adversary.Name | N/A | .data.alerts[] .eventTime |
N/A | If "Adversary" checked in "Metadata Objects" |
Dataminr Realt-time Pulse Alerts
The Dataminr Realt-time Pulse Alerts feed ingests Dataminr Pulse Real-time Alerts into the ThreatQ platform as events.GET https://api.dataminr.com/pulse/v1/lists The feed retrieves all the IDs (.watchlists.{{CATEGORY}}.id) for the lists configured in Dataminr Portal. The IDs are sent to the supplemental feeds Dataminr Get Next Alerts, Dataminr Get Previous Alerts to get the needed alerts. Sample Response:
{
"lists": {
"TOPIC": [
{
"id": 4807096,
"name": "Travel",
"type": "TOPIC"
}
],
"COMPANY": [
{
"id": 4807098,
"name": "Top Companies",
"type": "COMPANY"
}
],
"CUSTOM": [
{
"id": 4807094,
"name": "Top Detections",
"type": "CUSTOM"
}
]
}
}
Dataminr Real-time Supplemental Feeds
The integration utilizes three supplemental feeds: Dataminr Real-time Get Next Alerts, Dataminr Real-time Get Previous Alerts, Dataminr Real-time Get Alert by ID.
The Dataminr API has a cursor based implementation. Dataminr Real-time Get Next Alerts retrieves the alerts that Dataminr considers as new alerts for the user. Dataminr Real-time Get Previous Alerts retrieves the alerts that are considered old/read.
If user config Ingest Parent Alert is enabled and .alerts[].linkedAlerts[0].parentAlertId is different than .alerts[].alertId, the feed Dataminr Real-time Get Alert By ID ingests the parent alert for each entry.
Dataminr Get Next Alerts, Dataminr Get Previous Alerts - GET https://api.dataminr.com/pulse/v1/alerts
Dataminr Get Related Alerts - https://api.dataminr.com/pulse/v1/alerts/{{ALERT_ID}}
Sample Response:
{
"alerts": [
{
"alertId": "1407810963-1701783539058-3",
"alertType": {
"name": "Urgent"
},
"alertSectors": [
{
"name": "Retail"
}
],
"alertReferenceTerms": [
{
"text": "phishing"
},
{
"text": "impersonation"
}
],
"listsMatched": [
{
"id": "4177550",
"name": "Exploits",
"topicIds": [
"853023"
],
"subType": "DIGITAL_RISK"
}
],
"eventTime": 1701783733823,
"linkedAlerts": [
{
"count": 1,
"parentAlertId": "27892161055285410311760673005961-1760673005961-2"
}
],
"metadata": {
"cyber": {
"vulnerabilities": [
{
"id": "CVE-2023-49105",
"epssScore": 91.3,
"cvss": 9.8,
"products": [
{
"productName": "owncloud",
"productVersion": " ",
"productVendor": "owncloud"
}
],
"exploitPocLinks": []
}
],
"URL": [
{
"name": "ambionics.io"
}
],
"addresses": [
{
"ip": "148.72.164.186",
"port": "80"
}
],
"asns": [],
"orgs": [],
"hashes": [],
"products": [],
"malware": [],
"threatActors": [],
"asOrgs": [
{
"asn": "AS13335",
"asOrg": "Cloudflare"
}
],
"hashValues": []
}
},
"headline": "CVE-2023-49105 referenced on X (formerly Twitter)",
"subCaption": {
"bullets": {
"content": "Philip Morris mentioned in headline\nSampoerna and Philip Morris International mentioned in article",
"source": "According to Capital Romanian"
}
},
"alertCompanies": [
{
"name": "Apple Inc.",
"ticker": "\"apple+\""
}
],
"alertTopics": [
{
"id": "963118",
"name": "Industry Threats - Retail"
}
],
"estimatedEventLocation": {
"coordinates": [
37.3318598,
-122.0302485
],
"name": "Apple Inc. HQ, Cupertino, CA, USA",
"places": [
"8e51ba12f754ae46a6ec7816d6e7a617",
"f66b10a1b6d5d260b3ddb7e7518aa5ac",
"2f7245ea29c7d5a90bfd48512f971ef0",
"0a269a52d33a19cd680c4d33aef9a4af",
"4e9ea3cb3310c59405b5cd3844856d12"
],
"probability": 0.0,
"radius": 0.1
},
"sectors": [],
"headerColor": "FFFFAD",
"publisherCategory": {
"id": "chatter",
"name": "Chatter",
"color": "A24512",
"shortName": "CTR"
},
"dataminrAlertUrl": "https://app.dataminr.com/#alertDetail/5/1407810963-1701783539058-3",
"relatedTerms": [
{
"text": "exploit",
"url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22exploit%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22exploit%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
},
{
"text": "referenced",
"url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
}
],
"relatedTermsQueryURL": "https://app.dataminr.com/#search-popup/search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D",
"userRecentImages": [],
"userTopHashtags": [],
"publicPost": {
"timestamp": "2025-10-20T13:21:22.277Z",
"media": [],
"href": "https://www.axios.com/2023/12/05/us-israeli-settler-west-bank-visa-ban-plan",
"channels": [
"chatter"
]
}
}
]
}
ThreatQuotient provides the following default mapping for this feed:
The following information is added to the description of the Event:
.headline.subHeadline.title.subHeadline.content[].publicPost.media[].href.dataminrAlertUrl
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
| .headline | Event.Title | Event | .alertTimestamp | Dataminr Alert: CVE- 2023-49105referenced on X (formerly Twitter) |
Prepended with Dataminr Alert:. If Title Data Field equals Headline |
| .alertId | Event.Title | Event | .alertTimestamp | Dataminr Alert: 1 4078109 63-1701783539058-3 |
Prepended with Dataminr Alert:. If Title Data Field equals Alert ID |
| .alertReferenceTerms[] .text |
Event.Tags | Event | N/A | phishing | N/A |
| .linkedAlerts[0].count | Event.Attribute | Available Related Alerts |
.alertTimestamp | 1 | Updatable |
| .estimatedEventLocation. coordinates[0] |
Event.Attribute | Latitude | .alertTimestamp | 37.33 | Rounded to 2 decimals |
| .estimatedEventLocation. coordinates[1] |
Event.Attribute | Longitude | .alertTimestamp | -122.0 | Rounded to 2 decimals |
| .estimatedEventLocation .name |
Event.Attribute | Location | .alertTimestamp | Apple Inc. HQ, Cupertino, CA, USA |
N/A |
| .publicPost.href | Event.Attribute | Post Link | .alertTimestamp | https://www.axios.com/ 2023/12 /05/us-israeli-settler- west-bank-visa-ban-plan |
N/A |
| .publicPost.channels[] | Event.Attribute | Source Channel |
.alertTimestamp | Chatter | See Channel Mapping Table |
| .alertType.name | Event.Attribute | Alert Type | .alertTimestamp | Urgent | N/A |
| .alertCompanies[].name | Event.Attribute | Company | .alertTimestamp | Apple Inc. | N/A |
| .alertSectors[].name | Event.Attribute | Sector | .alertTimestamp | Retail | N/A |
| .alertTopics[].name | Event.Attribute | Category | .alertTimestamp | Industry Threats - Retail | N/A |
| .listsMatched[].name | Event.Attribute | Dataminr Watchlist Name |
.alertTimestamp | Exploits | N/A |
| .dataminrAlertUrl | Event.Attribute | Dataminr Alert URL |
.alertTimestamp | https://app.dataminr. com/# alertDetail/5/1407810963-1701783539058-3 |
N/A |
| .alertId | Event.Attribute | Alert ID | .alertTimestamp | 1407810963-1701783539058-3 | N/A |
| N/A | Event.Attribute | GenAI | .alertTimestamp | False | True if .liveBrief[] or .intelAgents [] have at least one entry, otherwise is False. Updatable. |
| .metadata.cyber. vulnerabilities[]. id |
Related Indicator/ Vulnerability.Value |
CVE/ Vulnerability |
.alertTimestamp | CVE-2023-49105 | Ingested according to Ingest CVEs As... if Vulnerabilities enabled in Metadata Objects. |
| .metadata.cyber. vulnerabilities[]. cvss |
Related Indicator/ Vulnerability.Attribute |
CVSS Score | .alertTimestamp | 9.8 | If CVSS score checked in Vulnerabilities Context. Updatable |
| .metadata.cyber. vulnerabilities[]. epssScore |
Related Indicator/ Vulnerability.Attribute |
EPSS Score | .alertTimestamp | 91.3 | If EPSS score checked in Vulnerabilities Context. Updatable |
| .metadata.cyber. vulnerabilities[]. products[] .productName |
Related Indicator/ Vulnerability.Attribute |
Product | .alertTimestamp | owncloud | if Products affected checked in Vulnerabilities Context |
| .metadata.cyber. vulnerabilities[]. products[] .productVendor |
Related Indicator/ Vulnerability.Attribute |
Vendor | .alertTimestamp | owncloud | if Vendors checked in Vulnerabilities Context |
| .metadata.cyber. vulnerabilities[]. exploitPoc Links[] |
Related Indicator/ Vulnerability.Attribute |
Exploit POC links |
.alertTimestamp | N/A | If Exploit POC links checked in Vulnerabilities Context |
| .metadata.cyber. addresses[].ip |
Related Indicator.Value | IP Address | .alertTimestamp | 148.72.164.186 | If Addresses enabled in Metadata Objects and any .alertReference Terms present in Alert Reference Terms for Addresses and URLs. |
| .metadata.cyber. addresses[].port |
Related Indicator. Attribute |
Port | .alertTimestamp | 80 | Attribute for IP Address. |
| .metadata.cyber. URL[].name |
Related Indicator.Value | FQDN | .alertTimestamp | ambionics.io | If URLs enabled in Metadata Objects and any .alertReferenceTerms present in Alert Reference Terms for Addresses and URLs. |
| .metadata.cyber. asOrgs[].asn |
Related Indicator. Attribute |
ASN | .alertTimestamp | AS13335 | For Addresses and URLs, if ASN enabled in ASN Metadata |
| .metadata.cyber. asOrgs[].asOrg |
Related Indicator. Attribute |
ASN Organization |
.alertTimestamp | Cloudflare | For Addresses and URLs, if ASN Organization enabled in ASN Metadata |
| .metadata.cyber. hashValues[]. value |
Related Indicator.Value | .metadata. cyber. hashValues[]. type |
.alertTimestamp | N/A | If Hashes checked in Metadata Objects |
| .metadata.cyber. malware[].name |
Related Malware.Value | Malware | .alertTimestamp | N/A | If Malware checked in Metadata Objects |
| .metadata.cyber. threatActors[]. name |
Related Adversary.Name | Adversary | .alertTimestamp | N/A | If Adversary checked in Metadata Objects |
Channel Mapping Table
ThreatQuotient provides the following Mapping table for Dataminr API and Portal values.
| Dataminr API Value | Dataminr Portal Value |
|---|---|
| news | Major News |
| majorblog | Major Blog |
| chatter | Chatter |
| localnews | Local News |
| stock | Stock Talk |
| market | Market Commentary |
| reported | Reporter |
| blog | Blog |
| corp | Corporate |
| gov | Government |
| emergency | Emergency Responders |
| university | University |
| sensor | Sensor |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
| Metric | Result |
|---|---|
| Run Time | 1 minute |
| Events | 46 |
| Event Attributes | 571 |
| Indicators | 57 |
| Indicator Attributes | 137 |
| Vulnerabilities | 154 |
| Vulnerability Attributes | 202 |
Known Issues / Limitations
- For
Dataminr Pulse Alertsintegration due to API limitations only one of the filtersDataminr ListandDataminr Querycan be used. If both are present theDataminr Queryfilter is ignored. If no filter is selected all the alerts will be ingested. TheList Typefilter is applied only ifDataminr Queryis not present.
Change Log
- Version 1.1.0
- Adds the ability to select which data field should be used to create the alert title
- Alerts that contain a ReGenAI Live Brief or a ReGenAI Intel Agent now have a
GenAIattribute set to True - Migrates from
v3 AlertsAPI toPulse v1 Alerts. The following changes occurred:- The
Dataminr Queryconfiguration has been deleted because the API no longer supports it - IP Addresses and URLs are filtered using
alertReferenceTerms[]because the necessary information is no longer present in thecategories[]property - The Ingest
related alertsfeature has been removed because the API no longer supports that capability - Adds
Ingest Parent Alertoption to ingest and relate the parent alert.
- The
- Version 1.0.2
- Added the following configuration parameters:
- Alert Type - filter threat intelligence to ingest into the ThreatQ platform by alert type.
- Enable SSL Verification
- Disable Proxies
- Added the following configuration parameters:
- Version 1.0.1
- Added the following new configuration parameters:
- Metadata Objects - ingests the selected related objects.
- ASN Metadata - ingest the selected metadata as address and URL attributes.
- Vulnerabilities Context - ingest the selected metadata as a vulnerability attribute.
- Added the following new configuration parameters:
- Version 1.0.0
- Initial release
PDF Guides
| Document | ThreatQ Version |
|---|---|
| Dataminr Pulse CDF Guide v1.1.0 | 5.22.0 or Greater |
| Dataminr Pulse CDF Guide v1.0.2 | 5.22.0 or Greater |
| Dataminr Pulse CDF Guide v1.0.1 | 5.22.0 or Greater |
| Dataminr Pulse CDF Guide v1.0.0 | 5.22.0 or Greater |