Current ThreatQ Version Filter
 

Flashpoint Ignite Alerts CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Flashpoint Ignite Alerts CDF for ThreatQ enables the automatic ingestion of an alert within Flashpoint.

The integration ingests threat intelligence data from the following endpoint:

  • Flashpoint Ignite Alerts -  ingests Ignite Alert data into the ThreatQ platform.  

The integration ingests following object types:

  • Adversaries
  • Events
    • Event Attributes
  • Indicators
  • Vulnerabilities

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration yaml file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration yaml file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

  6. The feed will be added to the integrations page.  You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameter under the Configuration tab:
    Parameter Description
    API Key Your Flashpoint Ignite Alerts API Key.
    API Options Optional - Enter a line-separated list of query IDs to filter alerts.
    Ingest Highlights Enable this parameter to ingest highlights.  
    Link Adversaries to Alerts Enable this parameter to link ingested adversaries to alerts. This parameter is disabled by default.  
    Save CVE Data as Select how to ingest CVEs as into the ThreatQ platform. Options include:
    • Indicators
    • Vulnerabilities
    Enable SSL Verification Enable this parameter to validate the host-provided SSL certificate. This parameter is enabled by default.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. 

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Flashpoint Ignite Alerts

The Flashpoint Ignite Alerts feed enables the automatic ingestion Ignite Alert data into the ThreatQ platform as Events, Indicators, and Vulnerabilities.  

GET https://api.flashpoint.io/alert-management/v1/notifications

Sample Response:

{
    "items": [
        {
      "id": "8a45bd35-1fac-4b35-aa27-630ab3821507",
      "resource": {
        "id": "LIjNc-xrVUynzUwsoqPfVw",
        "basetypes": [
          "chat",
          "conversation",
          "message",
          "telegram"
        ],
        "title": "𝗕𝗜𝗚𝗙𝗔𝗧𝗖𝗛𝗔𝗧™️💰",
        "sort_date": "2024-06-03T20:15:07Z",
        "site": {
          "title": "Telegram"
        },
        "container": {
          "name": "𝗕𝗜𝗚𝗙𝗔𝗧𝗖𝗛𝗔𝗧™️💰",
          "native_id": "1213408970",
          "title": "𝗕𝗜𝗚𝗙𝗔𝗧𝗖𝗛𝗔𝗧™️💰"
        },
        "site_actor": {
          "names": {
            "handle": "RISK"
          },
          "native_id": "5375938422"
        },
        "created_at": {
          "date-time": "2024-06-03T20:15:07+00:00",
          "raw": "1717445707",
          "timestamp": 1717445707
        }
      },
      "reason": {
        "id": "218f7b12-8c85-474e-8013-98d014e99c8c",
        "name": "Insider Threat Alerts",
        "text": "(\"I am an employee\" OR \"i'm an employee\" OR \"i can get access\" OR \"i have access to\" OR \"i work at\" OR \"i work for\" OR inny OR \"i'm employed at\" OR \"my occupation is\") NOT arsenal",
        "origin": "two-face",
        "details": {
          "sources": [
            "communities"
          ],
          "params": {
            "sort": "relevancy",
            "exclude": {},
            "include": {
              "date": {
                "end": "now",
                "label": "Last 7 Days",
                "start": "now-7d"
              }
            }
          }
        },
        "entity": {
          "id": "001o000000igOLYAA2",
          "name": "ThreatQ",
          "type": "organization"
        }
      },
      "status": null,
      "generated_at": "2024-06-03T20:16:12.875144Z",
      "created_at": "2024-06-03T20:16:14.716472Z",
      "tags": {},
      "highlights": {
        "body.text/plain": [
          "Nah I need 6 figs stims tho can fly you out where inny at"
        ]
      },
      "highlight_text": "Nah I need 6 figs stims tho can fly you out where inny at",
      "data_type": "chat",
      "parent_data_type": null,
      "source": "communities",
      "is_read": false
    }
    ],
  "pagination": {
    "next": "https://api.flashpoint.io/alert-management/v1/notifications?created_after=now-7d&created_before=nowATsize=25&cursor=1717444021.230215",
    "first": "https://api.flashpoint.io/alert-management/v1/notifications?created_after=now-7d&created_before=nowATsize=25&cursor=1717445812.558666"
  }
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
Alert: .items[].reason.name + .items[].
resource.site.title
, .items[].resource.
section
, .items[].resource.site_actor.
names.handle
, items[].resource.title[:147]
 + items[]..id
Event.Title Alert .generated_at Alert: Insider Threat Alerts... Keys are used conditionally based on what's available
.items[].highlights Event.Description N/A N/A Nah I need 6 figs stims tho can fly you out where <mark>inny</mark> at... Description is html formatted with available data
.items[].status Event.Attribute Status .generated_at N/A Updatable
.items[].created_at Event.Attribute Created At .generated_at 2024-06-03T20:16:14.716472Z  
.items[].data_type Event.Attribute Data Type .generated_at chat N/A
.items[].source Event.Attribute Source .generated_at communities N/A
.items[].is_read Event.Attribute Is Read .generated_at False Updatable
.items[].reason.entity.name Event.Attribute Entity .generated_at ThreatQ N/A
.items[].reason.name Event.Attribute Category .generated_at Insider Threat Alerts Updatable
.items[].reason.text Event.Attribute Search Text .generated_at (\"I am an employee\" OR \"i'm an employee\" OR \"i can get access... N/A
.items[].resource.basetypes Event.Attribute Base Type .generated_at chat, conversation N/A
.items[].resource.container.title Event.Attribute Container Title .generated_at 𝗕𝗜𝗚𝗙𝗔𝗧𝗖𝗛𝗔𝗧™️💰 N/A
.items[].soresourceurce.container.container.title Event.Attribute Container Title .generated_at N/A N/A
.items[].resource.container.name Event.Attribute Container Name .generated_at 𝗕𝗜𝗚𝗙𝗔𝗧𝗖𝗛𝗔𝗧™️💰 N/A
.items[].resource.container.container.name Event.Attribute Container Name .generated_at N/A N/A
.items[].resource.site.title Event.Attribute Site Title .generated_at Telegram N/A
.items[].highlights[].body.text/plain / .items[].highlight_text Event.Attribute Alert Highlights .generated_at Nah I need 6 figs stims tho can fly you out where <mark>inny</mark> at .items[].highlights[].body.text/plain joined by < /br> or .items[].highlight_text, User-configurable
.items[].highlights[].body.text/plain / .items[].highlight_text Related Vulnerability/Indicator CVE .generated_at CVE-2025-12389 CVE values mentioned in .items[].highlights[].body.text/plain or .items[].highlight_text, User-configurable
.items[].resource.site_actor.names.handle Event.Attribute Site Actor .generated_at RISK N/A
.items[].resource.site_actor.names.aliases[] Event.Attribute Site Actor .generated_at N/A N/A
.items[].resource.site_actor.names.handle Adversary.Value Adversary .generated_at RISK User-configurable
.items[].resource.site_actor.names.aliases[] Adversary.Value Adversary .generated_at N/A User-configurable

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Metric Result
Run Time 1 minute
Adversaries 24
Events 25
Event Attributes 442
Vulnerabilities 3

Change Log

  • Version 1.2.7
    • Resolved an issue where missing container and title information would cause feed runs to fail with an error applying filter error message. 
  • Version 1.2.6
    • The integration now ingests adversary object types.   
    • Added a new configuration parameter:
      • Link Adversaries to Alerts - link ingested adversaries to alerts.  
  • Version 1.2.5
    • Resolved an issue with incorrect Flashpoint Ignite links for Media type events.  
  • Version 1.2.4
    • Flashpoint Ignite links to alert descriptions are now ingested as descriptions in ThreatQ.   
  • Version 1.2.3
    • Site Actors are no longer ingested as related Adversaries.
    • Context information will no longer be included in the description and will now be saved as attributes.
    • Added a new configuration parameter:
      • Save CVE Data As - select if CVEs should be ingested as Indicators or Vulnerabilities.  
  • Version 1.2.2
    • Added a new configuration parameter: Ingest Highlights.  Users can use this setting to control if the feed will ingest Alert Highlights attribute.
    • Removed HTML tags from the Alert Highlights attribute.
  • Version 1.2.1
    • Updated the style for Event descriptions.
    • Added Search Text and Alert Highlights attributes to Events.
    • Added Actors as related Adversaries.
    • Added two new configuration parameters: Disable Proxies and Enable SSL Verification.
  • Version 1.2.0
    • Updated the feed to use Flashpoint Ignite Alerts endpoint.
      • Alerts now include rich text descriptions containing alert highlights and metadata.
      • Alert Titles have been improved.
      • The Flashpoint Link attribute has been replaced with a link within the description. 
    • Rebranded the integration to FlashPoint Ignite Alerts CDF.
    • Updated the minimum ThreatQ version to v5.12.1.  
  • Version 1.1.1
    • Long alert bodies, which would trigger feed errors, are now truncated.
  • Version 1.1.0
    • Optimized integration code to improve overall performance and upgraded support tier from Not Supported to ThreatQ Supported.  
  • Version 1.0.0
    • Initial Release