Current ThreatQ Version Filter
 

Dataminr Pulse CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Dataminr Pulse CDF enables the automatic ingestion of alerts from Dataminr Pulse portal into ThreatQ. Dataminr Pulse contains alerts on activity across multiple publicly available sources. The alerts are ingested as ThreatQ events.

The integration provides the following feeds:

Both feeds ingest the same alerts.  Select one based on your organization's Client ID and Secret.

  • Dataminr Pulse Alerts ingests Dataminr Pulse Alerts into ThreatQ as events.
  • Dataminr Real-time Pulse Alerts

The integration ingests the following system objects:

  • Adversaries
  • Events
    • Event Attributes
  • Indicators
    • Indicator Attributes
  • Malware
  • Vulnerabilities
    • Vulnerability Attributes

Prerequisites

The following is required to use the integration:

  • Dataminr Pulse Alerts:
    • Dataminr Pulse Client ID and Secret.  Contact Dataminr for the credentials
  • Dataminr Real-time Pulse Alerts:
  • At least one valid Alert List must be configured on the account before using this integration.

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

  6. The feed will be added to the integrations page.  You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
    1. Enter the following parameters under the Configuration tab:

      Dataminr Pulse Alerts

      Parameter Description
      Client ID Your Client ID used to authenticate with the Dataminr Pulse API.
      Client Secret Your Client Secret used to authenticate with the Dataminr Pulse API.
      Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
      Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
      Dataminr List If specified, the feed ingests only alerts belonging to the specified list from Dataminr application.
      Alert Type Filter data ingested into the platform by Alert Type. Options include:
      • All
      • Flash
      • Urgent
      • Alert
      Title Data Field Select the data field to use in the alert title
      • Headline (default)
      • Alert ID
      Ingest Parent Alert When enabled the feed ingests and relates the parent alert even if it does not satisfy the previously configured filters.
      Metadata Objects When enabled, the feed will ingest the selected related objects.  Options include:
      • Addresses
      • URLs
      • Vulnerabilities
      • Adversary
      • Malware
      • Hashes

      Network Scans, Phishing, Malware and Domain Impersonation Categories - only Addresses and URLs will be ingested if selected.

      Alert Reference Terms for Addresses and URLs Enter a comma-separated list of reference terms. Only alerts containing these terms will have their related Addresses and URLs ingested. Leave it empty to always ingest Addresses and URLs. (default: phishing, malicious, impersonation)
      ASN Metadata When enabled, the feed will ingest the selected metadata as Address and URL attributes.  Options include:
      • ASN (default)
      • ASN Organization (default)
      Ingest CVEs As Select the ThreatQ object type to ingest the CVEs into ThreatQ as. Options include:
      • Vulnerabilities (default)
      • Indicators
      Vulnerabilities Context When enabled, the feed will ingest the selected metadata as Vulnerability attributes.  Options include:
      • CVSS Score (default)
      • EPSS Score
      • Products affected (default)
      • Vendors
      • Exploit POC links
      Set indicator status to... Select the status to apply to indicators.


      Configuration Screen
      Dataminr Real-time Pulse Alerts

      Parameter Description
      Client ID Your Client ID used to authenticate with the Dataminr Real-time Pulse API.
      Client Secret Your Client Secret used to authenticate with the Dataminr Relal-time Pulse API.
      Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
      Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
      Dataminr List If specified, the feed ingests only alerts belonging to the specified list from Dataminr application.
      Alert Type Filter data ingested into the platform by Alert Type. Options include:
      • All
      • Flash
      • Urgent
      • Alert
      Title Data Field Select the data field to use in the alert title
      • Headline (default)
      • Alert ID
      Ingest Parent Alert When enabled the feed ingests and relates the parent alert even if it does not satisfy the previously configured filters.
      Metadata Objects When enabled, the feed will ingest the selected related objects.  Options include:
      • Addresses
      • URLs
      • Vulnerabilities
      • Adversary
      • Malware
      • Hashes

      Network Scans, Phishing, Malware and Domain Impersonation Categories - only Addresses and URLs will be ingested if selected.

      Alert Reference Terms for Addresses and URLs Enter a comma-separated list of reference terms. Only alerts containing these terms will have their related Addresses and URLs ingested. Leave it empty to always ingest Addresses and URLs. (default: phishing, malicious, impersonation)
      ASN Metadata When enabled, the feed will ingest the selected metadata as Address and URL attributes.  Options include:
      • ASN (default)
      • ASN Organization (default)
      Ingest CVEs As Select the ThreatQ object type to ingest the CVEs into ThreatQ as. Options include:
      • Vulnerabilities (default)
      • Indicators
      Vulnerabilities Context When enabled, the feed will ingest the selected metadata as Vulnerability attributes.  Options include:
      • CVSS Score (default)
      • EPSS Score
      • Products affected (default)
      • Vendors
      • Exploit POC links
      Set indicator status to... Select the status to apply to indicators.

       

  4. Review any additional settings, make any changes if needed, and click on Save.
  5. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Dataminr Pulse Alerts

The Dataminr Pulse Alerts feed ingests Dataminr Pulse Alerts into the ThreatQ platform as events.  

GET https://gateway.dataminr.com/account/2/get_lists

The feed retrieves all the IDs (.watchlists.{{CATEGORY}}.id) for the lists configured in Dataminr Portal. The IDs are sent to the supplemental feeds Dataminr Get Next Alerts, Dataminr Get Previous Alerts to get the needed alerts.

Sample Response:

{
  "watchlists": {
    "TOPIC": [
      {
        "id": 4153708,
        "properties": {
          "watchlistColor": "darkblue"
        },
        "name": "Government",
        "description": "",
        "type": "TOPIC"
      }
    ],
    "COMPANY": [
      {
        "name": "Top Companies",
        "companies": [
          {
            "id": "e7a463003d6229c750586f8a263ec4e0",
            "name": "YUM! Brands, Inc."
          }
        ],
        "description": "",
        "type": "COMPANY",
        "id": 4153722,
        "properties": {
          "watchlistColor": "darkblue"
        }
      }
    ],
    "CUSTOM": [
      {
        "id": 4177550,
        "properties": {
          "watchlistColor": "darkblue"
        },
        "name": "Exploits",
        "description": "",
        "type": "CUSTOM"
      }
    ]
  }
}

Dataminr Supplemental Feeds

The integration utilizes three supplemental feeds: Dataminr Get Next Alerts, Dataminr Get Previous Alerts, Dataminr Get Related Alerts.

The Dataminr API has a cursor based implementation. Dataminr Get Next Alerts retrieves the alerts that Dataminr considers as new alerts for the user. Dataminr Get Previous Alerts retrieves the alerts that are considered old/read. If user config Ingest related alerts is enabled, the feed Dataminr Get Related Alerts ingested the related alerts for each entry.

Dataminr Get Next Alerts, Dataminr Get Previous AlertsGET https://gateway.dataminr.com/api/3/alerts

Dataminr Get Related Alerts - GET https://gateway.dataminr.com/alerts/2/get_related?id={{ALERT_ID}}

Sample Response:

{
  "data": {
    "alerts": [
      {
        "alertId": "1407810963-1701783539058-3",
        "alertType": {
          "id": "urgent",
          "name": "Urgent",
          "color": "FFBB05"
        },
        "watchlistsMatchedByType": [
          {
            "id": "4177550",
            "type": "CUSTOM",
            "name": "Exploits",
            "externalTopicIds": [],
            "userProperties": {
              "omnilist": "true"
            }
          }
        ],
        "availableRelatedAlerts": 0,
        "eventTime": 1701783733823,
        "eventVolume": 0,
        "metadata": {
          "cyber": {
            "vulnerabilities": [
              {
                "id": "CVE-2023-49105",
                "cvss": 9.8,
                "products": [
                  {
                    "productName": "owncloud",
                    "productVersion": " ",
                    "productVendor": "owncloud"
                  }
                ],
                "exploitPocLinks": []
              }
            ],
            "URLs": [
              "ambionics.io"
            ],
            "addresses": [
              {
                "ip": "148.72.164.186",
                "port": "80"
              }
            ],
            "asns": [],
            "orgs": [],
            "hashes": [],
            "products": [],
            "malwares": [],
            "threats": [],
            "asOrgs": [
              {
                "asn": "AS13335",
                "asOrg": "Cloudflare"
              }
            ],
            "hashValues": []
          }
        },
        "caption": "CVE-2023-49105 referenced on X (formerly Twitter)",
        "subCaption": {
          "bullets": {
            "content": "Philip Morris mentioned in headline\nSampoerna and Philip Morris International mentioned in article",
            "source": "According to Capital Romanian"
          }
        },
        "companies": [
          {
            "name": "Apple Inc.",
            "topicType": "company",
            "id": "2adac6e9b077021a8c4e5de1a3aa057b",
            "idStr": "2adac6e9b077021a8c4e5de1a3aa057b",
            "ticker": "\"apple+\"",
            "retired": false
          }
        ],
        "categories": [
          {
            "name": "Cybersecurity",
            "topicType": "category",
            "id": "124022",
            "idStr": "124022",
            "path": "/TOPIC/EXT/CS/124022",
            "retired": false
          }
        ],
        "eventLocation": {
          "coordinates": [
            37.3318598,
            -122.0302485
          ],
          "name": "Apple Inc. HQ, Cupertino, CA, USA",
          "places": [
            "8e51ba12f754ae46a6ec7816d6e7a617",
            "f66b10a1b6d5d260b3ddb7e7518aa5ac",
            "2f7245ea29c7d5a90bfd48512f971ef0",
            "0a269a52d33a19cd680c4d33aef9a4af",
            "4e9ea3cb3310c59405b5cd3844856d12"
          ],
          "probability": 0.0,
          "radius": 0.1
        },
        "sectors": [],
        "headerColor": "FFFFAD",
        "publisherCategory": {
          "id": "chatter",
          "name": "Chatter",
          "color": "A24512",
          "shortName": "CTR"
        },
        "expandAlertURL": "https://app.dataminr.com/#alertDetail/5/1407810963-1701783539058-3",
        "expandUserURL": "https://app.dataminr.com/#userDetail/@ambionics",
        "relatedTerms": [
          {
            "text": "exploit",
            "url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22exploit%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22exploit%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
          },
          {
            "text": "referenced",
            "url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
          }
        ],
        "relatedTermsQueryURL": "https://app.dataminr.com/#search-popup/search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D",
        "userRecentImages": [],
        "userTopHashtags": [],
        "post": {
          "timestamp": 1701788203472,
          "languages": [],
          "media": [],
          "link": "https://www.axios.com/2023/12/05/us-israeli-settler-west-bank-visa-ban-plan"
        },
        "source": {
          "verified": false,
          "displayName": "Axios",
          "channels": [
            "news"
          ]
        }
      }
    ]
  }

ThreatQuotient provides the following default mapping for this feed:

The following information is added to the description of the Event:

  • .headline
  • .subHeadline.title
  • .subHeadline.content[]
  • .publicPost.media[].href
  • .dataminrAlertUrl
Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.data.alerts[].caption Event.Title N/A .data.alerts[]
.eventTime
Dataminr Alert: CVE-
2023-49105
referenced on X
(formerly Twitter)
Prepended with Dataminr
Alert:.If Title Data
Field equals Caption
.data.alerts[].alertId Event.Title N/A .data.alerts[]
.eventTime
Dataminr Alert: 1407810963-
170
1783539058-3
Prepended with Dataminr
Alert:. If Title Data
Field equals Alert ID
.data.alerts[].subCaption.
bullets +.data.alerts[]
.post.media[].url
Event.Description N/A N/A According to Capital Romanian
hilip Morris mentioned
in headline...
N/A
.data.alerts[].available
RelatedAlerts
Event.Attribute Available Related
Alerts
.data.alerts[]
.eventTime
0 Updated if already exists
.data.alerts[].eventLocation
.coordinates[0]
Event.Attribute Latitude .data.alerts[]
.eventTime
37.33 Rounded to 2 decimals
.data.alerts[].eventLocation
.coordinates[1]
Event.Attribute Longitude .data.alerts[]
.eventTime
-122.0 Rounded to 2 decimals
.data.alerts[].eventLocation
.name
Event.Attribute Location .data.alerts[]
.eventTime
Apple Inc. HQ,
Cupertino, CA, USA
N/A
.data.alerts[].post.link Event.Attribute Post Link .data.alerts[]
.eventTime
https://www.axios.com/
2023/12/
05/us-israeli-settler-west-bank-visa
-ban-plan
N/A
.data.alerts[].source.
verified
Event.Attribute Is Source Verified .data.alerts[]
.eventTime
False Updated if already exists
.data.alerts[].source.
display
Name
Event.Attribute Source .data.alerts[]
.eventTime
Axios N/A
.data.alerts[].source.
channels
Event.Attribute Source Channel .data.alerts[]
.eventTime
Major News See Channel Mapping Table
.data.alerts[].alertType.
name
Event.Attribute Alert Type .data.alerts[]
.eventTime
Urgent N/A
.data.alerts[].companies[]
.name
Event.Attribute Company .data.alerts[]
.eventTime
Apple Inc. N/A
.data.alerts[].categories[]
.name
Event.Attribute Category .data.alerts[]
.eventTime
Cybersecurity N/A
.data.alerts[].watchlists
MatchedBy
Type[].name
Event.Attribute Dataminr Watchlist Name .data.alerts[]
.eventTime
Exploits N/A
.data.alerts[].expandAlert
URL
Event.Attribute Dataminr Alert URL .data.alerts[]
.eventTime
https://app.dataminr.com
/#alert
Detail/5/1407810963-1701783539058-3
N/A
.data.alerts[].metadata.
cyber
.vulnerabilities[].id
Related Indicator/
Vulnerability.Value
CVE/ N/A .data.alerts[]
.eventTime
CVE-2023-49105 Ingested according to 
Ingest CVEs As... config
.data.alerts[].metadata.
cyber
.vulnerabilities[].cvss
Related Indicator/
Vulnerability.Attribute
CVSS Score .data.alerts[]
.eventTime
9.8 If "CVSS score" checked in
"Vulnerabilities Context"
. Updated if already exists
.data.alerts[].metadata.
cyber.
vulnerabilities[]
.products[].productName
Related Indicator/
Vulnerability.Attribute
Product .data.alerts[]
.eventTime
owncloud if "Products affected" checked
in "Vulnerabilities
Context"
.data.alerts[].metadata.
cyber.
vulnerabilities[]
.products[].productVendor
Related Indicator/
Vulnerability.Attribute
Vendor .data.alerts[]
.eventTime
owncloud if "Vendors" checked in
"Vulnerabilities Context"
.data.alerts[].metadata.
cyber.
vulnerabilities[]
.exploitPocLinks[]
Related Indicator/
Vulnerability.Attribute
Exploit POC Link .data.alerts[]
.eventTime
N/A If "Exploit POC links" checked
in "Vulnerabilities
Context"
.data.alerts[].metadata.
cyber
.addresses[].ip
Related Indicator.Value IP Addresss .data.alerts[]
.eventTime
148.72.164.186 Ingests IP Address IOCs, if
"Addresses" checked in
"Metadata Objects", if category is
one of:"Network Scans", "Phishing",
"Malware", "Domain Impersonation"
.data.alerts[].metadata.
cyber
.addresses[].port
Related Indicator.Attribute Port .data.alerts[]
.eventTime
80 N/A
.data.alerts[].metadata.
cyber.URLs[]
Related Indicator.Value FQDN .data.alerts[]
.eventTime
ambionics.io Ingests URL IOCs, if "URLs" checked
in "Metadata
Objects", if category is one of:
"Network Scans", "Phishing",
"Malware", "Domain Impersonation"
.data.alerts[].metadata.
cyber.
asOrgs[].asn
Related Indicator.Attribute ASN .data.alerts[]
.eventTime
AS13335 For Addresses and URLs, if "ASN"
checked in ASN
Metadata
.data.alerts[].metadata.
cyber
.asOrgs[].asOrg
Related Indicator.Attribute ASN Organization .data.alerts[]
.eventTime
Cloudflare For Addresses and URLs, if "ASN Organization" checked
in "ASN Metadata"
.data.alerts[].metadata.
cyber
.hashValues[].hash
Related Indicator.Value .data.alerts[].
metadata.cyber
.hashValues[].type
.data.alerts[]
.eventTime
N/A Ingests Hash IOCs, if "Hashes"
checked in "Metadata
Objects"
.data.alerts[].metadata.
cyber
.malwares[]
Related Malware.Value N/A .data.alerts[]
.eventTime
N/A If "Malware" checked in "Metadata
Objects"
.data.alerts[].metadata.
cyber
.threats[]
Related Adversary.Name N/A .data.alerts[]
.eventTime
N/A If "Adversary" checked in "Metadata
Objects"

Dataminr Realt-time Pulse Alerts

The Dataminr Realt-time Pulse Alerts feed ingests Dataminr Pulse Real-time Alerts into the ThreatQ platform as events.   GET https://api.dataminr.com/pulse/v1/lists The feed retrieves all the IDs (.watchlists.{{CATEGORY}}.id) for the lists configured in Dataminr Portal. The IDs are sent to the supplemental feeds Dataminr Get Next Alerts, Dataminr Get Previous Alerts to get the needed alerts. Sample Response:
   
    {
  "lists": {
    "TOPIC": [
      {
        "id": 4807096,
        "name": "Travel",
        "type": "TOPIC"
      }
    ],
    "COMPANY": [
      {
        "id": 4807098,
        "name": "Top Companies",
        "type": "COMPANY"
      }
    ],
    "CUSTOM": [
      {
        "id": 4807094,
        "name": "Top Detections",
        "type": "CUSTOM"
      }
    ]
  }
}

Dataminr Real-time Supplemental Feeds

The integration utilizes three supplemental feeds: Dataminr Real-time Get Next Alerts, Dataminr Real-time Get Previous Alerts, Dataminr Real-time Get Alert by ID.

The Dataminr API has a cursor based implementation. Dataminr Real-time Get Next Alerts retrieves the alerts that Dataminr considers as new alerts for the user. Dataminr Real-time Get Previous Alerts retrieves the alerts that are considered old/read.

If user config Ingest Parent Alert is enabled and .alerts[].linkedAlerts[0].parentAlertId is different than .alerts[].alertId, the feed Dataminr Real-time Get Alert By ID ingests the parent alert for each entry.

Dataminr Get Next Alerts, Dataminr Get Previous AlertsGET https://api.dataminr.com/pulse/v1/alerts

Dataminr Get Related Alerts - https://api.dataminr.com/pulse/v1/alerts/{{ALERT_ID}}

Sample Response:

{
  "alerts": [
    {
      "alertId": "1407810963-1701783539058-3",
      "alertType": {
        "name": "Urgent"
      },
      "alertSectors": [
        {
          "name": "Retail"
        }
      ],
      "alertReferenceTerms": [
        {
          "text": "phishing"
        },
        {
          "text": "impersonation"
        }
      ],
      "listsMatched": [
        {
          "id": "4177550",
          "name": "Exploits",
          "topicIds": [
            "853023"
          ],
          "subType": "DIGITAL_RISK"
        }
      ],
      "eventTime": 1701783733823,
      "linkedAlerts": [
        {
          "count": 1,
          "parentAlertId": "27892161055285410311760673005961-1760673005961-2"
        }
      ],
      "metadata": {
        "cyber": {
          "vulnerabilities": [
            {
              "id": "CVE-2023-49105",
              "epssScore": 91.3,
              "cvss": 9.8,
              "products": [
                {
                  "productName": "owncloud",
                  "productVersion": " ",
                  "productVendor": "owncloud"
                }
              ],
              "exploitPocLinks": []
            }
          ],
          "URL": [
            {
              "name": "ambionics.io"
            }
          ],
          "addresses": [
            {
              "ip": "148.72.164.186",
              "port": "80"
            }
          ],
          "asns": [],
          "orgs": [],
          "hashes": [],
          "products": [],
          "malware": [],
          "threatActors": [],
          "asOrgs": [
            {
              "asn": "AS13335",
              "asOrg": "Cloudflare"
            }
          ],
          "hashValues": []
        }
      },
      "headline": "CVE-2023-49105 referenced on X (formerly Twitter)",
      "subCaption": {
        "bullets": {
          "content": "Philip Morris mentioned in headline\nSampoerna and Philip Morris International mentioned in article",
          "source": "According to Capital Romanian"
        }
      },
      "alertCompanies": [
        {
          "name": "Apple Inc.",
          "ticker": "\"apple+\""
        }
      ],
      "alertTopics": [
        {
          "id": "963118",
          "name": "Industry Threats - Retail"
        }
      ],
      "estimatedEventLocation": {
        "coordinates": [
          37.3318598,
          -122.0302485
        ],
        "name": "Apple Inc. HQ, Cupertino, CA, USA",
        "places": [
          "8e51ba12f754ae46a6ec7816d6e7a617",
          "f66b10a1b6d5d260b3ddb7e7518aa5ac",
          "2f7245ea29c7d5a90bfd48512f971ef0",
          "0a269a52d33a19cd680c4d33aef9a4af",
          "4e9ea3cb3310c59405b5cd3844856d12"
        ],
        "probability": 0.0,
        "radius": 0.1
      },
      "sectors": [],
      "headerColor": "FFFFAD",
      "publisherCategory": {
        "id": "chatter",
        "name": "Chatter",
        "color": "A24512",
        "shortName": "CTR"
      },
      "dataminrAlertUrl": "https://app.dataminr.com/#alertDetail/5/1407810963-1701783539058-3",
      "relatedTerms": [
        {
          "text": "exploit",
          "url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22exploit%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22exploit%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
        },
        {
          "text": "referenced",
          "url": "https://app.dataminr.com/app/core/corporate/search-popup.html#search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D"
        }
      ],
      "relatedTermsQueryURL": "https://app.dataminr.com/#search-popup/search/%7B%22history%22%3A%5B%7B%22displayTitle%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22elements%22%3A%5B%7B%22topicName%22%3A%22blogpost,cve,cyber exploits,exploit,referenced%22%2C%22type%22%3A%22string%22%2C%22topicId%22%3A-1%2C%22equitySymbol%22%3A%22%22%7D%5D%2C%22target%22%3A%22searchinput%22%2C%22type%22%3A%22complex%22%2C%22isEquity%22%3Afalse%2C%22topicId%22%3A-1%2C%22text%22%3A%22%22%7D%5D%7D/location/%7B%22center%22%3A%7B%22lat%22%3A14.43468021529728%2C%22lng%22%3A-65.91796875%2C%22zoom%22%3A2%7D%2C%22zoom%22%3A2%2C%22extent%22%3A%7B%22north%22%3A73.42842364106818%2C%22east%22%3A48.1640625%2C%22south%22%3A-62.91523303947613%2C%22west%22%3A-179.6484375%7D%7D",
      "userRecentImages": [],
      "userTopHashtags": [],
      "publicPost": {
        "timestamp": "2025-10-20T13:21:22.277Z",
        "media": [],
        "href": "https://www.axios.com/2023/12/05/us-israeli-settler-west-bank-visa-ban-plan",
        "channels": [
          "chatter"
        ]
      }
    }
  ]
}

ThreatQuotient provides the following default mapping for this feed:

The following information is added to the description of the Event:

  • .headline
  • .subHeadline.title
  • .subHeadline.content[]
  • .publicPost.media[].href
  • .dataminrAlertUrl
Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.headline Event.Title Event .alertTimestamp Dataminr Alert: CVE-
2023-49105referenced
on X
(formerly Twitter)
Prepended with Dataminr
Alert:. If Title Data Field equals 
Headline
.alertId Event.Title Event .alertTimestamp Dataminr Alert: 1
4078109
63
-1701783539058-3
Prepended with Dataminr
Alert:. If Title Data Field equals 
Alert ID
.alertReferenceTerms[]
.text
Event.Tags Event N/A phishing N/A
.linkedAlerts[0].count Event.Attribute Available
Related
Alerts
.alertTimestamp 1 Updatable
.estimatedEventLocation.
coordinates[0]
Event.Attribute Latitude .alertTimestamp 37.33 Rounded to 2 decimals
.estimatedEventLocation.
coordinates[1]
Event.Attribute Longitude .alertTimestamp -122.0 Rounded to 2 decimals
.estimatedEventLocation
.name
Event.Attribute Location .alertTimestamp Apple Inc. HQ,
Cupertino,
CA, USA
N/A
.publicPost.href Event.Attribute Post Link .alertTimestamp https://www.axios.com/
2023/12
/05/us-israeli-settler-
west-bank-visa-ban-plan
N/A
.publicPost.channels[] Event.Attribute Source
Channel
.alertTimestamp Chatter See Channel Mapping Table
.alertType.name Event.Attribute Alert Type .alertTimestamp Urgent N/A
.alertCompanies[].name Event.Attribute Company .alertTimestamp Apple Inc. N/A
.alertSectors[].name Event.Attribute Sector .alertTimestamp Retail N/A
.alertTopics[].name Event.Attribute Category .alertTimestamp Industry Threats - Retail N/A
.listsMatched[].name Event.Attribute Dataminr
Watchlist
Name
.alertTimestamp Exploits N/A
.dataminrAlertUrl Event.Attribute Dataminr
Alert
URL
.alertTimestamp https://app.dataminr.
com/#
alertDetail/5/1407810963-1701783539058-3
N/A
.alertId Event.Attribute Alert ID .alertTimestamp 1407810963-1701783539058-3 N/A
N/A Event.Attribute GenAI .alertTimestamp False True if .liveBrief[] or .intelAgents
[] have at least one entry,
otherwise is False. Updatable.
.metadata.cyber.
vulnerabilities[].
id
Related Indicator/
Vulnerability.Value
CVE/
Vulnerability
.alertTimestamp CVE-2023-49105 Ingested according to Ingest CVEs As... if Vulnerabilities enabled
in Metadata Objects.
.metadata.cyber.
vulnerabilities[].
cvss
Related Indicator/
Vulnerability.Attribute
CVSS Score .alertTimestamp 9.8 If CVSS score checked in 
Vulnerabilities Context.
Updatable
.metadata.cyber.
vulnerabilities[].
epssScore
Related Indicator/
Vulnerability.Attribute
EPSS Score .alertTimestamp 91.3 If EPSS score checked in 
Vulnerabilities Context.
Updatable
.metadata.cyber.
vulnerabilities[].
products[]
.productName
Related Indicator/
Vulnerability.Attribute
Product .alertTimestamp owncloud if Products affected checked
in Vulnerabilities Context
.metadata.cyber.
vulnerabilities[].
products[]
.productVendor
Related Indicator/
Vulnerability.Attribute
Vendor .alertTimestamp owncloud if Vendors checked in 
Vulnerabilities Context
.metadata.cyber.
vulnerabilities[].
exploitPoc
Links[]
Related Indicator/
Vulnerability.Attribute
Exploit POC
links
.alertTimestamp N/A If Exploit POC links checked in 
Vulnerabilities Context
.metadata.cyber.
addresses[].ip
Related Indicator.Value IP Address .alertTimestamp 148.72.164.186 If Addresses enabled in Metadata
Objects and any .alertReference
Terms present
in Alert Reference Terms for
Addresses
and URLs.
.metadata.cyber.
addresses[].port
Related Indicator.
Attribute
Port .alertTimestamp 80 Attribute for IP Address.
.metadata.cyber.
URL[].name
Related Indicator.Value FQDN .alertTimestamp ambionics.io If URLs enabled in Metadata Objects 
and any .alertReferenceTerms 
present in Alert Reference Terms for Addresses
and URLs.
.metadata.cyber.
asOrgs[].asn
Related Indicator.
Attribute
ASN .alertTimestamp AS13335 For Addresses and URLs, if ASN 
enabled in ASN Metadata
.metadata.cyber.
asOrgs[].asOrg
Related Indicator.
Attribute
ASN
Organization
.alertTimestamp Cloudflare For Addresses and URLs, if ASN Organization enabled in ASN
Metadata
.metadata.cyber.
hashValues[].
value
Related Indicator.Value .metadata.
cyber.
hashValues[].
type
.alertTimestamp N/A If Hashes checked in Metadata
Objects
.metadata.cyber.
malware[].name
Related Malware.Value Malware .alertTimestamp N/A If Malware checked in Metadata
Objects
.metadata.cyber.
threatActors[].
name
Related Adversary.Name Adversary .alertTimestamp N/A If Adversary checked in Metadata
Objects

Channel Mapping Table

ThreatQuotient provides the following Mapping table for Dataminr API and Portal values.

Dataminr API Value Dataminr Portal Value
news Major News
majorblog Major Blog
chatter Chatter
localnews Local News
stock Stock Talk
market Market Commentary
reported Reporter
blog Blog
corp Corporate
gov Government
emergency Emergency Responders
university University
sensor Sensor

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Metric Result
Run Time 1 minute
Events 46
Event Attributes 571
Indicators 57
Indicator Attributes 137
Vulnerabilities 154
Vulnerability Attributes 202

Known Issues / Limitations

  • For Dataminr Pulse Alerts integration due to API limitations only one of the filters Dataminr List and Dataminr Query can be used. If both are present the Dataminr Query filter is ignored. If no filter is selected all the alerts will be ingested. The List Type filter is applied only if Dataminr Query is not present.

Change Log

  • Version 1.1.0
    • Adds the ability to select which data field should be used to create the alert title
    • Alerts that contain a ReGenAI Live Brief or a ReGenAI Intel Agent now have a GenAI attribute set to True
    • Migrates from v3 Alerts API to Pulse v1 Alerts. The following changes occurred:
      • The Dataminr Query configuration has been deleted because the API no longer supports it
      • IP Addresses and URLs are filtered using alertReferenceTerms[] because the necessary information is no longer present in the categories[] property
      • The Ingest related alerts feature has been removed because the API no longer supports that capability
      • Adds Ingest Parent Alert option to ingest and relate the parent alert.
  • Version 1.0.2
    • Added the following configuration parameters:
      • Alert Type - filter threat intelligence to ingest into the ThreatQ platform by alert type.
      • Enable SSL Verification
      • Disable Proxies
  • Version 1.0.1
    • Added the following new configuration parameters:
      • Metadata Objects - ingests the selected related objects.  
      • ASN Metadata - ingest the selected metadata as address and URL attributes.
      • Vulnerabilities Context - ingest the selected metadata as a vulnerability attribute.
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Dataminr Pulse CDF Guide v1.1.0 5.22.0 or Greater
Dataminr Pulse CDF Guide v1.0.2 5.22.0 or Greater
Dataminr Pulse CDF Guide v1.0.1 5.22.0 or Greater
Dataminr Pulse CDF Guide v1.0.0 5.22.0 or Greater