Intel 471 Reports CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
| Current Integration Version | 3.0.0 |
| Compatible with ThreatQ Versions | >= 5.24.0 |
| Support Tier | ThreatQ Supported |
Introduction
The Intel 471 Reports CDF integration enables ThreatQ users to ingest and operationalize intelligence from Intel 471’s report streams, providing access to a wide range of curated Information Reports and Intel Reports. Reports are retrieved based on user-defined filter criteria and are ordered by creation date, ensuring that the most recent intelligence is prioritized for analysis.
The integration provides the following feeds:
- Intel 471 Breach Alerts - queries the Intel 471 breach alert report stream and retrieves the complete details of each breach alert report using its unique identifier.
- Intel 471 FINTEL Reports - queries the Intel 471 FINTEL report stream and retrieves the complete details of each FINTEL report using its unique identifier.
- Intel 471 Geopolitical Reports - queries the Intel 471 geopolitical report stream and retrieves the complete details of each geopolitical report using its unique identifier.
- Intel 471 Information Reports - queries the Intel 471 information report stream and retrieves the complete details of each information report using its unique identifier.
- Intel 471 Spot Reports - queries the Intel 471 spot report stream and retrieves the complete details of each spot report using its unique identifier.
The integration ingests the following system objects:
- Adversary
- Adversary Attributes
- Attack Pattern
- Attack Pattern Attributes
- Indicator
- Indicator Attributes
- Malware
- Malware Attributes
- Report
- Report Attributes
Prerequisites
The following is required to run the integration:
- An Intel471 Client ID
- An Intel471 Client Secret
- Here’s a clearer, smoother rewording: MITRE ATT&CK attack patterns must already be ingested through a prior run of the MITRE ATT&CK CDF feeds for MITRE TIDs extracted from Actor Profiles to correctly map to their corresponding attack patterns. The MITRE ATT&CK CDF includes the following feeds:
- MITRE Enterprise ATT&CK
- MITRE Mobile ATT&CK
- MITRE ICS ATT&CK
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the integration file on your local machine
- Select the individual feeds to install, when prompted, and click Install.
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- The feed(s) will be added to the integrations page. You will still need to configure and then enable the feed(s).
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Intel 471 Breach Alerts Parameters
Parameter Description Client ID Your Intel 471 Client ID. Client Secret Your Intel 471 Client Secret. Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI. Text Filter Optional - enter a free-text value to filter the reports. GIRs Filter Optional - specify a GIR value to filter the reports. Count per Page The maximum number of records to retrieve from the provider per request (0-1000). The default value is 100. Attribute Filter Select the contextual attributes to ingest into ThreatQ. Options include: - GIRs
- Victims (default)
- Confidence Level (default)
- Sensitive Source (default)
- Portal URL (default)
Ingest Tags Enable this parameter to ingest tags into ThreatQ. This parameter is enabled by default. Relationship Filter Select which relationship context to ingest into ThreatQ. Options include: - Actors Subject of Report (default)
- Handles (Adversaries)
- Malware Families (default)
Indicator Filter Select which indicators to ingest into ThreatQ. Options include: - Malicious URLs (default)
- Malicious Domains (default)
- IP Addresses (default)
- CVE IDs (default)
- MD5 Hashes (default)
- SHA-1 Hashes (default)
- SHA-256 Hashes (default)
- Actor Domains
- Actor Websites
- URLs
- File Paths
- File Names
- Email Addresses
- Jabber Usernames
- Telegram Usernames
URL Status (Non-Malicious) Select the status to use for URLs. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Domain Status Select the status to use for actor domains. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Website Status Select the status to use for actor websites. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Intel 471 FINTEL Reports Parameters
Parameter Description Client ID Your Intel 471 Client ID. Client Secret Your Intel 471 Client Secret. Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI. Text Filter Optional - enter a free-text value to filter the reports. GIRs Filter Optional - specify a GIR value to filter the reports. FINTEL Sub Type Filter Optional - select which FINTEL report subtypes to search. Options include: - Actor Profiles (default)
- Intelligence (default)
- Service Profiles (default)
- Underground Perspectives (default)
- Underground Pulses (default)
- Whitepapers (default)
- Threat Briefs (default)
- Breach Reports (default)
- Intelligence Summaries (default)
- Malware Campaigns (default)
- FINTEL Blogs (default)
Count per Page The maximum number of records to retrieve from the provider per request (0-1000). The default value is 100. Attribute Filter Select the contextual attributes to ingest into ThreatQ. Options include: - GIRs
- Victims (default)
- Region Information
- Country Information (default)
- Admiralty Codes (default)
- Motivations (default)
- Source Characterization
- Sensitive Source
- Portal URL (default)
Ingest Tags Enable this parameter to ingest tags into ThreatQ. This parameter is enabled by default. Relationship Filter Select which relationship context to ingest into ThreatQ. Options include: - Actors Subject of Report (default)
- Handles (Adversaries)
- Malware Families (default)
Indicator Filter Select which indicators to ingest into ThreatQ. Options include: - Malicious URLs (default)
- Malicious Domains (default)
- IP Addresses (default)
- CVE IDs (default)
- MD5 Hashes (default)
- SHA-1 Hashes (default)
- SHA-256 Hashes (default)
- Actor Domains
- Actor Websites
- URLs
- File Paths
- File Names
- Email Addresses
- Jabber Usernames
- Telegram Usernames
URL Status (Non-Malicious) Select the status to use for URLs. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Domain Status Select the status to use for actor domains. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Website Status Select the status to use for actor websites. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Intel 471 Geopolitical Reports Parameters
Parameter Description Client ID Your Intel 471 Client ID. Client Secret Your Intel 471 Client Secret. Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI. Text Filter Optional - enter a free-text value to filter the reports. GIRs Filter Optional - specify a GIR value to filter the reports. Geopolitical Sub Type Filter Optional - select which geopolitical report subtypes to search. Options include: - Spot Reports
- Intelligence Bulletins (default)
- Intelligence Summaries (default)
- Tension Point Profiles (default)
- Threat Briefs (default)
- Significant Activity Reports (default)
- Intelligence Estimates (default)
- Adversary Profiles (default)
Country Optional - filter reports by country. Report Location Country Optional - filter reports by the country associated with the report’s location. Count per Page The maximum number of records to retrieve from the provider per request (0-1000). The default value is 100. Attribute Filter Select the contextual attributes to ingest into ThreatQ. Options include: - GIRs
- Victims (default)
- Region Information (default)
- Country Information (default)
- Sensitive Source
- Portal URL (default)
Ingest Tags Enable this parameter to ingest tags into ThreatQ. This parameter is enabled by default. Relationship Filter Select which relationship context to ingest into ThreatQ. Options include: - Actors Subject of Report (default)
- Handles (Adversaries)
- Malware Families (default)
Indicator Filter Select which indicators to ingest into ThreatQ. Options include: - Malicious URLs (default)
- Malicious Domains (default)
- IP Addresses (default)
- CVE IDs (default)
- MD5 Hashes (default)
- SHA-1 Hashes (default)
- SHA-256 Hashes (default)
- Actor Domains
- Actor Websites
- URLs
- File Paths
- File Names
- Email Addresses
- Jabber Usernames
- Telegram Usernames
URL Status (Non-Malicious) Select the status to use for URLs. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Domain Status Select the status to use for actor domains. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Website Status Select the status to use for actor websites. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Intel 471 Information Reports Parameters
Parameter Description Client ID Your Intel 471 Client ID. Client Secret Your Intel 471 Client Secret. Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI. Text Filter Optional - enter a free-text value to filter the reports. GIRs Filter Optional - specify a GIR value to filter the reports. Count per Page The maximum number of records to retrieve from the provider per request (0-1000). The default value is 100. Attribute Filter Select the contextual attributes to ingest into ThreatQ. Options include: - GIRs
- Victims (default)
- Region Information
- Country Information (default)
- Admiralty Codes (default)
- Motivations (default)
- Source Characterization
- Sensitive Source
- Portal URL (default)
Ingest Tags Enable this parameter to ingest tags into ThreatQ. This parameter is enabled by default. Relationship Filter Select which relationship context to ingest into ThreatQ. Options include: - Actors Subject of Report (default)
- Handles (Adversaries)
- Malware Families (default)
Indicator Filter Select which indicators to ingest into ThreatQ. Options include: - Malicious URLs (default)
- Malicious Domains (default)
- IP Addresses (default)
- CVE IDs (default)
- MD5 Hashes (default)
- SHA-1 Hashes (default)
- SHA-256 Hashes (default)
- Actor Domains
- Actor Websites
- URLs
- File Paths
- File Names
- Email Addresses
- Jabber Usernames
- Telegram Usernames
URL Status (Non-Malicious) Select the status to use for URLs. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Domain Status Select the status to use for actor domains. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Website Status Select the status to use for actor websites. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Intel 471 Spot Reports Parameters
Parameter Description Client ID Your Intel 471 Client ID. Client Secret Your Intel 471 Client Secret. Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI. Text Filter Optional - enter a free-text value to filter the reports. GIRs Filter Optional - specify a GIR value to filter the reports. Count per Page The maximum number of records to retrieve from the provider per request (0-1000). The default value is 100. Attribute Filter Select the contextual attributes to ingest into ThreatQ. Options include: - GIRs
- Victims (default)
- Sensitive Source
- Portal URL (default)
Ingest Tags Enable this parameter to ingest tags into ThreatQ. This parameter is enabled by default. Relationship Filter Select which relationship context to ingest into ThreatQ. Options include: - Actors Subject of Report (default)
- Handles (Adversaries)
- Malware Families (default)
Indicator Filter Select which indicators to ingest into ThreatQ. Options include: - Malicious URLs (default)
- Malicious Domains (default)
- IP Addresses (default)
- CVE IDs (default)
- MD5 Hashes (default)
- SHA-1 Hashes (default)
- SHA-256 Hashes (default)
- Actor Domains
- Actor Websites
- URLs
- File Paths
- File Names
- Email Addresses
- Jabber Usernames
- Telegram Usernames
URL Status (Non-Malicious) Select the status to use for URLs. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Domain Status Select the status to use for actor domains. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
Actor Website Status Select the status to use for actor websites. Options include: - Indirect (default)
- Active
- Review
- Whitelisted
The default setting is Indirect as these are typically are not malicious.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Intel 471 Breach Alerts
The Intel 471 Breach Alerts feed queries the Intel 471 breach alert report stream and retrieves the full details of each breach alert report using its unique ID.
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/breach-alert/stream
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/breach-alert/{{ id }}
Sample Response (truncated):
{
"id": "report--49e247e4-2a50-5994-9c04-cd4fecbf324d",
"type": "breach_alert",
"title": "Lawson Software (Thailand) Co. Ltd. possibly compromised by actor/group The Gentlemen on Apr 23, 2026",
"creation_ts": "2026-04-24T20:14:56Z",
"released_ts": "2026-04-24T20:14:56Z",
"last_updated_ts": "2026-04-24T20:14:56Z",
"information_ts": "2026-04-23T00:00:00Z",
"entities": [
{
"type": "Handle",
"value": "The Gentlemen"
}
],
"sources": [
{
"type": "internal",
"title": "Lawson Software",
"links": {
"verity_portal": {
"href": "https://verity.intel471.com/sources/data-leak-sites/website--ecedcedd-3df4-541e-976d-2f2d8aed0320/threads/thread--78e0fc85-3ada-5922-b4e5-89e719cee3b6"
}
},
"index": 2,
"last_updated_ts": "2026-04-23T00:00:00Z",
"source_type": "Data Leak Post"
}
],
"classification": {
"girs": [
{
"path": "1.1.1",
"name": "Ransomware malware"
}
]
},
"victims": [
{
"name": "Lawson Software (Thailand) Co. Ltd.",
"links": [
{
"external": {
"href": "https://lawson.co.th"
}
}
],
"country": "Thailand",
"revenue": "< US $5 million",
"region": "Asia",
"industries": [
{
"industry": "IT or technology consulting industry",
"sector": "Professional services and consulting sector"
}
]
}
],
"actor_or_group": "The Gentlemen",
"body": "<p>On April 23, 2026, the operator or operators running...</p>",
"confidence": {
"level": "medium",
"description": "The intelligence picture is developing, cannot be corroborated or has some limitations."
},
"links": {
"verity_api": {
"href": "https://api.intel471.cloud/integrations/intel-report/v1/reports/breach-alert/report--49e247e4-2a50-5994-9c04-cd4fecbf324d"
},
"verity_portal": {
"href": "https://verity.intel471.com/intelligence/breachAlertReportView/report--49e247e4-2a50-5994-9c04-cd4fecbf324d"
}
},
"related_reports": []
}
ThreatQuotient provides the following default mapping for this feed:
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.title, .id |
Report Value |
N/A |
.released_ts |
Lawson Software (Thailand) Co. Ltd. possibly compromised by actor/group The Gentlemen on Apr 23, 2026 |
N/A |
.body, .sources[] |
Report Description |
N/A |
N/A |
On April 23, 2026, the operator or operators running... |
N/A |
.id |
Report Attribute |
Report ID |
N/A |
report--49e247e4-2a50-5994-9c04-cd4fecbf324d |
N/A |
.type |
Report Attribute |
Report Family |
N/A |
BREACH_ALERT |
N/A |
.type |
Report Attribute |
Report Type |
N/A |
BREACH_ALERT |
N/A |
.classification.girs[] |
Report Attribute |
GIR |
N/A |
1.1.1 - Ransomware malware |
User configurable |
.victims[].name |
Report Attribute |
Victim |
N/A |
Lawson Software (Thailand) Co. Ltd. |
User configurable |
.confidence.level |
Report Attribute |
Confidence Level |
N/A |
medium |
User configurable |
.is_sensitive_source |
Report Attribute |
Sensitive Source |
N/A |
N/A |
User configurable |
.links.verity_portal.href |
Report Attribute |
Portal URL |
N/A |
https://verity.intel471.com/intelligence/breachAlertReportView/report--49e247e4-2a50-5994-9c04-cd4fecbf324d |
User configurable |
.actor_or_group |
Adversary |
N/A |
.released_ts |
The Gentlemen |
User configurable |
.entities[] |
Adversary |
N/A |
.released_ts |
Handle: The Gentlemen |
When type == Handle; User configurable |
.entities[] |
Adversary Attribute |
Bitcoin Address |
.released_ts |
N/A |
When type == BitcoinAddress; User configurable |
.entities[] |
Adversary Attribute |
Crypto Address |
.released_ts |
N/A |
When type == OtherCryptoCurrencies; User configurable |
.entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorDomain; User configurable |
.entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorWebsite; User configurable |
.entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == MaliciousURL; User configurable |
.entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == MaliciousDomain; User configurable |
.entities[] |
Related Indicator |
CVE |
.released_ts |
N/A |
When type == CveID; User configurable |
.entities[] |
Related Indicator |
IP Address |
.released_ts |
N/A |
When type == IPAddress; User configurable |
.entities[] |
Related Indicator |
Email Address |
.released_ts |
N/A |
When type == EmailAddress; User configurable |
.entities[] |
Related Indicator |
File Path |
.released_ts |
N/A |
When type == FileType; User configurable |
.entities[] |
Related Indicator |
Filename |
.released_ts |
N/A |
When type == FileName; User configurable |
.entities[] |
Related Indicator |
MD5 |
.released_ts |
N/A |
When type == MD5; User configurable |
.entities[] |
Related Indicator |
SHA-1 |
.released_ts |
N/A |
When type == SHA1; User configurable |
.entities[] |
Related Indicator |
SHA-256 |
.released_ts |
N/A |
When type == SHA256; User configurable |
.entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == URL; User configurable |
.entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Telegram; User configurable |
.entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Telegram; User configurable |
.entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Jabber; User configurable |
.entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Jabber; User configurable |
.entities[] |
Related Malware |
N/A |
.released_ts |
N/A |
When type == MalwareFamily; User configurable |
Intel 471 FINTEL Reports
The Intel 471 FINTEL Reports feed queries the Intel 471 FINTEL report stream and retrieves the complete details of each FINTEL report using its unique identifier.
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/fintel/stream
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/fintel/{{ id }}
Sample Response (truncated):
{
"id": "report--57981044-4889-55fd-a0e1-b3c370212a2b",
"type": "fintel",
"sub_type": "underground_perspective",
"title": "TeamPCP threat group allegedly compromises Bitwarden password management service",
"information_ts": "2026-04-28T00:00:00Z",
"creation_ts": "2026-04-28T20:46:35Z",
"released_ts": "2026-04-28T20:46:35Z",
"entities": [
{
"type": "Handle",
"value": "blackwall"
}
],
"locations": [
{
"region": "North America",
"country": "United States",
"link": "impacts"
}
],
"last_updated_ts": "2026-04-29T07:34:03Z",
"classification": {
"girs": [
{
"path": "1.1.5",
"name": "Information-stealer malware"
}
]
},
"body": "<p>On April 23, 2026, the Bitwarden open source password...</p>",
"sources": [
{
"type": "internal",
"title": "Node package manager supply chain attack dubbed Shai-Hulud compromises hundreds of packages",
"links": {
"verity_api": {
"href": "https://api.intel471.cloud/integrations/intel-report/v1/reports/fintel/report--b9d69580-f653-5407-82a3-c732f0d65bd1"
},
"verity_portal": {
"href": "https://verity.intel471.com/intelligence/fintelReportView/report--b9d69580-f653-5407-82a3-c732f0d65bd1"
}
},
"index": 6,
"last_updated_ts": "2025-09-19T00:00:00Z",
"source_type": "Underground Perspective"
}
],
"victims": [
{
"name": "Bitwarden Inc.",
"links": [
{
"external": {
"href": "https://bitwarden.com/"
}
}
]
}
],
"is_sensitive_source": true,
"attachments": [
{
"url": "https://api.intel471.cloud/integrations/intel-report/v1/reports/fintel/report--57981044-4889-55fd-a0e1-b3c370212a2b/attachments/8b8759011fa38b7aa2578a14221c301e954fb837dea6bb7b5a72cf7b83a471fc",
"file_name": "Figure 1.png",
"malicious": false,
"file_size": 305319,
"mime_type": "image/png",
"description": ""
}
],
"related_reports": [],
"derived_entities": [],
"links": {
"verity_api": {
"href": "https://api.intel471.cloud/integrations/intel-report/v1/reports/fintel/report--57981044-4889-55fd-a0e1-b3c370212a2b"
},
"verity_portal": {
"href": "https://verity.intel471.com/intelligence/fintelReportView/report--57981044-4889-55fd-a0e1-b3c370212a2b"
}
}
}
ThreatQuotient provides the following default mapping for this feed:
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.title, .id |
Report Value |
N/A |
.released_ts |
TeamPCP threat group allegedly compromises Bitwarden password management service |
N/A |
.body, .sources[] |
Report Description |
N/A |
N/A |
On April 23, 2026, the Bitwarden open source password... |
N/A |
.body |
Attack Pattern |
N/A |
N/A |
N/A |
ACTOR_PROFILE only |
.id |
Report Attribute |
Report ID |
N/A |
report--57981044-4889-55fd-a0e1-b3c370212a2b |
N/A |
.type |
Report Attribute |
Report Family |
N/A |
FINTEL |
N/A |
.sub_type |
Report Attribute |
Report Type |
N/A |
UNDERGROUND_PERSPECTIVE |
N/A |
.classification.girs[] |
Report Attribute |
GIR |
N/A |
1.1.5 - Information-stealer malware |
User configurable |
.locations[].region |
Report Attribute |
Impacted Region |
N/A |
North America |
User configurable |
.locations[].country |
Report Attribute |
Impacted Country |
N/A |
United States |
User configurable |
.victims[].name |
Report Attribute |
Victim |
N/A |
Bitwarden Inc. |
User configurable |
.is_sensitive_source |
Report Attribute |
Sensitive Source |
N/A |
true |
User configurable |
.links.verity_portal.href |
Report Attribute |
Portal URL |
N/A |
https://verity.intel471.com/intelligence/fintelReportView/report--57981044-4889-55fd-a0e1-b3c370212a2b |
User configurable |
.entities[], .derived_entities[] |
Adversary |
N/A |
.released_ts |
Handle: blackwall |
When type == Handle; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Bitcoin Address |
.released_ts |
N/A |
When type == BitcoinAddress; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Crypto Address |
.released_ts |
N/A |
When type == OtherCryptoCurrencies; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
ActorDomain: audit.checkmarx.cx |
When type == ActorDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorWebsite; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == MaliciousURL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == MaliciousDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
CVE |
.released_ts |
N/A |
When type == CveID; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
IP Address |
.released_ts |
IPAddress: 94.154.172.43 |
When type == IPAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Email Address |
.released_ts |
N/A |
When type == EmailAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
File Path |
.released_ts |
N/A |
When type == FileType; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Filename |
.released_ts |
FileName: @bitwarden/cli@2026.4.0 |
When type == FileName; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
MD5 |
.released_ts |
N/A |
When type == MD5; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-1 |
.released_ts |
N/A |
When type == SHA1; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-256 |
.released_ts |
SHA256: 18f784b3bc9a0bcdcb1a8d7f51bc5f54323fc40cbd874119354ab609bef6e4cb |
When type == SHA256; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == URL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Related Malware |
N/A |
.released_ts |
N/A |
When type == MalwareFamily; User configurable |
Intel 471 Geopolitical Reports
The Intel 471 Geopolitical Reports feed queries the Intel 471 geopolitical report stream and retrieves the complete details of each geopolitical report using its unique identifier.
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/geopol/stream
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/geopol/{{ id }}
Sample Response (truncated):
{
"id": "report--83cd3937-5953-5501-a990-60ab9fc96504",
"type": "geopol_report",
"sub_type": "significant_activity_report",
"title": "Russian President Putin hosts Iranian foreign minister, pledges to support Iran in pursuit of peace",
"creation_ts": "2026-04-28T18:15:59Z",
"released_ts": "2026-04-28T18:15:59Z",
"last_updated_ts": "2026-04-28T18:15:59Z",
"information_ts": "2026-04-27T00:00:00Z",
"sources": [
{
"type": "external",
"title": "Meeting with Iranian Foreign Minister Abbas Araghchi",
"links": {
"external": {
"href": "http://kremlin.ru/events/president/news/79633"
}
},
"index": 1,
"last_updated_ts": "2026-04-27T00:00:00Z",
"source_type": "External Link"
}
],
"classification": {
"girs": [
{
"path": "6.1.6.2",
"name": "National government"
}
]
},
"links": {
"verity_api": {
"href": "https://api.intel471.cloud/integrations/intel-report/v1/reports/geopol/report--83cd3937-5953-5501-a990-60ab9fc96504"
},
"verity_portal": {
"href": "https://verity.intel471.com/intelligence/geopolReportView/report--83cd3937-5953-5501-a990-60ab9fc96504"
}
},
"body": "<p>On April 27, 2026, Russian President Vladimir Putin hosted...</p>",
"entities": [],
"locations": [
{
"region": "Europe",
"country": "Russia",
"link": "originated from"
}
],
"attachments": [],
"related_reports": [],
"country_profiles": [
{
"id": "report--ecede7d6-74a5-5fd9-ac63-5d7aab39a270",
"country": "Russia",
"country_iso_code": "RU",
"threat_rating": "severe",
"security_assessment": "high",
"information_ts": "2025-02-28T00:00:00Z",
"is_country_of_interest": false
}
],
"regional_tension_points": [
{
"id": "report--559f91e8-d8de-58f7-858b-09dac64ba4f6",
"name": "Russia-Ukraine war continues: Russian President Putin signals intent for long war of attrition, prolonged indirect conflict with West",
"information_ts": "2025-10-01T00:00:00Z"
}
],
"derived_entities": [],
"significant_activity": {
"summary": "<p>On April 27, 2026, Russian President Vladimir Putin hosted...</p>",
"comments": "<p>Almost immediately after the outbreak of the latest conflict...</p>",
"event_tag": "political"
}
}
ThreatQuotient provides the following default mapping for this feed:
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.title, .id |
Report Value |
N/A |
.released_ts |
Russian President Putin hosts Iranian foreign minister, pledges to support Iran in pursuit of peace |
N/A |
.significant_activity.summary, .body, .sources[], .attachments[] |
Report Description |
N/A |
N/A |
On April 27, 2026, Russian President Vladimir Putin hosted... |
N/A |
.significant_activity.comments |
Report Description |
N/A |
N/A |
Almost immediately after the outbreak of the latest conflict... |
N/A |
.id |
Report Attribute |
Report ID |
N/A |
report--83cd3937-5953-5501-a990-60ab9fc96504 |
N/A |
.type |
Report Attribute |
Report Family |
N/A |
GEOPOL |
N/A |
.sub_type |
Report Attribute |
Report Type |
N/A |
SIGNIFICANT_ACTIVITY_REPORT |
N/A |
.classification.girs[] |
Report Attribute |
GIR |
N/A |
6.1.6.2 - National government |
User configurable |
.locations[].region, .locations[].country |
Report Attribute |
Originated From |
N/A |
Russia (Europe) |
User configurable |
.locations[].region, .locations[].country |
Report Attribute |
Active |
N/A |
Russia (Europe) |
User configurable |
.locations[].region |
Report Attribute |
Impacted Region |
N/A |
Middle East |
User configurable |
.locations[].country |
Report Attribute |
Impacted Country |
N/A |
Iran |
User configurable |
.victims[].name |
Report Attribute |
Victim |
N/A |
N/A |
User configurable |
.is_sensitive_source |
Report Attribute |
Sensitive Source |
N/A |
N/A |
User configurable |
.links.verity_portal.href |
Report Attribute |
Portal URL |
N/A |
https://verity.intel471.com/intelligence/geopolReportView/report--83cd3937-5953-5501-a990-60ab9fc96504 |
User configurable |
.significant_activity.event_tag |
Report Tag |
N/A |
N/A |
political |
User configurable |
.entities[], .derived_entities[] |
Adversary |
N/A |
.released_ts |
N/A |
When type == Handle; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Bitcoin Address |
.released_ts |
N/A |
When type == BitcoinAddress; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Crypto Address |
.released_ts |
N/A |
When type == OtherCryptoCurrencies; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorWebsite; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == MaliciousURL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == MaliciousDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
CVE |
.released_ts |
N/A |
When type == CveID; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
IP Address |
.released_ts |
N/A |
When type == IPAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Email Address |
.released_ts |
N/A |
When type == EmailAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
File Path |
.released_ts |
N/A |
When type == FileType; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Filename |
.released_ts |
N/A |
When type == FileName; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
MD5 |
.released_ts |
N/A |
When type == MD5; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-1 |
.released_ts |
N/A |
When type == SHA1; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-256 |
.released_ts |
N/A |
When type == SHA256; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == URL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Related Malware |
N/A |
.released_ts |
N/A |
When type == MalwareFamily; User configurable |
Intel 471 Information Reports
The Intel 471 Information Reports feed queries the Intel 471 information report stream and retrieves the complete details of each information report using its unique identifier.
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/info/stream
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/info/{{ id }}
Sample Response:
{
"id": "report--e712c94b-354c-51d2-ac6f-4125ffbd614b",
"type": "info_report",
"assessment": {
"admiralty_code": "F6"
},
"motivation": ["CC"],
"title": "Actor nameek (aka lynxx0x) offers underground travel services",
"information_ts": "2026-04-12T00:00:00Z",
"creation_ts": "2026-04-29T18:26:52Z",
"released_ts": "2026-04-29T18:26:52Z",
"source_characterization": "Information was derived from the Exploit forum, our reliable source and our actors' database.",
"entities": [
{
"type": "Handle",
"value": "1oooooo"
}
],
"locations": [
{
"region": "Asia",
"country": "Japan",
"link": "impacts"
}
],
"last_updated_ts": "2026-04-29T18:26:52Z",
"actor_subject_of_report": [
{
"handle": "nameek",
"aliases": ["lynxx0x"]
}
],
"classification": {
"girs": [
{
"path": "1.3.8",
"name": "Malware spamming"
}
]
},
"is_sensitive_source": false,
"attachments": [
{
"url": "https://api.intel471.cloud/integrations/intel-report/v1/reports/info/report--e712c94b-354c-51d2-ac6f-4125ffbd614b/attachments/0a1a091d0726053d80793281d453c337daeee2cd6948b92f5ed0ea4513638c35",
"file_name": "Exploit.png",
"malicious": false,
"file_size": 95169,
"mime_type": "image/png",
"description": ""
}
],
"related_reports": [],
"derived_entities": [],
"researcher_comments": "<p>Actor and information assessment The actor nameek has been...</p>",
"body": "<p>On March 8, 2026, the actor nameek posted the...</p>",
"body_translated": "<p>On March 8, 2026, the actor nameek posted the...</p>",
"victims": [],
"executive_summary": "<p>This is an Activity Report on the actor nameek...</p>",
"links": {
"verity_api": {
"href": "https://api.intel471.cloud/integrations/intel-report/v1/reports/info/report--e712c94b-354c-51d2-ac6f-4125ffbd614b"
},
"verity_portal": {
"href": "https://verity.intel471.com/intelligence/infoReportView/report--e712c94b-354c-51d2-ac6f-4125ffbd614b"
}
}
}
ThreatQuotient provides the following default mapping for this feed:
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.title, .id |
Report Value |
N/A |
.released_ts |
Actor nameek (aka lynxx0x) offers underground travel services |
N/A |
.executive_summary, .researcher_comments, .body_translated, .body |
Report Description |
N/A |
N/A |
On March 8, 2026, the actor nameek posted the... |
N/A |
.id |
Report Attribute |
Report ID |
N/A |
report--e712c94b-354c-51d2-ac6f-4125ffbd614b |
N/A |
.type |
Report Attribute |
Report Family |
N/A |
INFOREP |
N/A |
.type |
Report Attribute |
Report Type |
N/A |
INFOREP |
N/A |
.classification.girs[] |
Report Attribute |
GIR |
N/A |
1.3.8 - Malware spamming |
User configurable |
.locations[].region |
Report Attribute |
Impacted Region |
N/A |
Asia |
User configurable |
.locations[].country |
Report Attribute |
Impacted Country |
N/A |
Japan |
User configurable |
.assessment.admiralty_code |
Report Attribute |
Admiralty Reliability |
N/A |
F |
User configurable. Uses 1st character of the code |
.assessment.admiralty_code |
Report Attribute |
Admiralty Credibility |
N/A |
6 |
User configurable. Uses 2nd character of the code |
.motivation[] |
Report Attribute |
Motivation |
N/A |
CC |
User configurable |
.source_characterization |
Report Attribute |
Source |
N/A |
Information was derived from the Exploit forum, our reliable source and our actors' database. |
User configurable |
.victims[].name |
Report Attribute |
Victim |
N/A |
N/A |
User configurable |
.is_sensitive_source |
Report Attribute |
Sensitive Source |
N/A |
false |
User configurable |
.links.verity_portal.href |
Report Attribute |
Portal URL |
N/A |
https://verity.intel471.com/intelligence/infoReportView/report--e712c94b-354c-51d2-ac6f-4125ffbd614b |
User configurable |
.actor_subject_of_report[].handle |
Adversary |
N/A |
.released_ts |
nameek |
User configurable |
.actor_subject_of_report[].aliases[] |
Adversary Attribute |
Alias |
N/A |
lynxx0x |
User configurable |
.entities[], .derived_entities[] |
Adversary |
N/A |
.released_ts |
Handle: 1oooooo |
When type == Handle; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Bitcoin Address |
.released_ts |
N/A |
When type == BitcoinAddress; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Crypto Address |
.released_ts |
N/A |
When type == OtherCryptoCurrencies; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorWebsite; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == MaliciousURL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == MaliciousDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
CVE |
.released_ts |
N/A |
When type == CveID; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
IP Address |
.released_ts |
N/A |
When type == IPAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Email Address |
.released_ts |
N/A |
When type == EmailAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
File Path |
.released_ts |
N/A |
When type == FileType; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Filename |
.released_ts |
N/A |
When type == FileName; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
MD5 |
.released_ts |
N/A |
When type == MD5; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-1 |
.released_ts |
N/A |
When type == SHA1; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-256 |
.released_ts |
N/A |
When type == SHA256; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == URL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
Telegram: @anonymousXLX |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
Telegram |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Related Malware |
N/A |
.released_ts |
MalwareFamily: Angel Drainer |
When type == MalwareFamily; User configurable |
Intel 471 Sport Reports
The Intel 471 Spot Reports feed queries the Intel 471 spot report stream and retrieves the complete details of each spot report using its unique identifier.
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/spot/stream
GET https://api.intel471.cloud/integrations/intel-report/v1/reports/spot/{{ id }}
Sample Response (truncated):
{
"id": "report--dc7d5b66-d36d-563f-9ff8-4e43276fda24",
"type": "spot_report",
"title": "ShinyHunters (aka SP1D3R HUNTERS) group launches #FederalB0yz aka #FBIHunters Telegram channel to expose competing threat actors",
"last_updated_ts": "2026-04-29T13:30:09Z",
"creation_ts": "2026-04-28T14:08:56Z",
"released_ts": "2026-04-28T14:08:56Z",
"information_ts": "2026-04-27T00:00:00Z",
"body": "On April 24, 2026, the ShinyHunters aka SP1D3R HUNTERS, Scattered...",
"classification": {
"girs": [
{
"path": "3.3",
"name": "Dedicated criminal infrastructure"
}
]
},
"sources": [
{
"type": "internal",
"title": "Telegram channel",
"links": {
"verity_portal": {
"href": "https://verity.intel471.com/sources/messaging-services/thread/room--fec53450-debb-5f54-acc4-0cb0613885cc"
}
}
}
],
"entities": [
{
"type": "Handle",
"value": "Mr. Raccoon"
}
],
"victims": [],
"is_sensitive_source": true,
"related_reports": [],
"derived_entities": [],
"links": {
"verity_api": {
"href": "https://api.intel471.cloud/integrations/intel-report/v1/reports/spot/report--dc7d5b66-d36d-563f-9ff8-4e43276fda24"
},
"verity_portal": {
"href": "https://verity.intel471.com/intelligence/spotReportView/report--dc7d5b66-d36d-563f-9ff8-4e43276fda24"
}
}
}
ThreatQuotient provides the following default mapping for this feed:
| Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
|---|---|---|---|---|---|
.title, .id |
Report Value |
N/A |
.released_ts |
ShinyHunters (aka SP1D3R HUNTERS) group launches #FederalB0yz aka #FBIHunters Telegram channel to expose competing threat actors |
N/A |
.body, .sources[] |
Report Description |
N/A |
N/A |
On April 24, 2026, the ShinyHunters aka SP1D3R HUNTERS, Scattered... |
N/A |
.id |
Report Attribute |
Report ID |
N/A |
report--dc7d5b66-d36d-563f-9ff8-4e43276fda24 |
N/A |
.type |
Report Attribute |
Report Family |
N/A |
SPOTREP |
N/A |
.type |
Report Attribute |
Report Type |
N/A |
SPOTREP |
N/A |
.classification.girs[] |
Report Attribute |
GIR |
N/A |
3.3 - Dedicated criminal infrastructure |
User configurable |
.victims[].name |
Report Attribute |
Victim |
N/A |
N/A |
User configurable |
.is_sensitive_source |
Report Attribute |
Sensitive Source |
N/A |
true |
User configurable |
.links.verity_portal.href |
Report Attribute |
Portal URL |
N/A |
https://verity.intel471.com/intelligence/spotReportView/report--dc7d5b66-d36d-563f-9ff8-4e43276fda24 |
User configurable |
.entities[], .derived_entities[] |
Adversary |
N/A |
.released_ts |
Handle: Mr. Raccoon |
When type == Handle; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Bitcoin Address |
.released_ts |
N/A |
When type == BitcoinAddress; User configurable |
.entities[], .derived_entities[] |
Adversary Attribute |
Crypto Address |
.released_ts |
N/A |
When type == OtherCryptoCurrencies; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == ActorWebsite; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == MaliciousURL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
FQDN |
.released_ts |
N/A |
When type == MaliciousDomain; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
CVE |
.released_ts |
N/A |
When type == CveID; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
IP Address |
.released_ts |
N/A |
When type == IPAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Email Address |
.released_ts |
N/A |
When type == EmailAddress; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
File Path |
.released_ts |
N/A |
When type == FileType; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Filename |
.released_ts |
N/A |
When type == FileName; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
MD5 |
.released_ts |
N/A |
When type == MD5; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-1 |
.released_ts |
N/A |
When type == SHA1; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
SHA-256 |
.released_ts |
N/A |
When type == SHA256; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
URL |
.released_ts |
N/A |
When type == URL; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
Telegram: @fb1hunt3rz |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
Telegram |
When type == Telegram; User configurable |
.entities[], .derived_entities[] |
Related Indicator |
Username |
.released_ts |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Indicator Attribute |
Platform |
N/A |
N/A |
When type == Jabber; User configurable |
.entities[], .derived_entities[] |
Related Malware |
N/A |
.released_ts |
N/A |
When type == MalwareFamily; User configurable |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Intel 471 Breach Alerts
| Metric | Result |
|---|---|
| Run Time | 1 minute |
| Adversaries | 30 |
| Indicators | 1 |
| Indicator Attributes | 1 |
| Reports | 33 |
| Report Attributes | 528 |
Intel 471 FINTEL Reports
| Metric | Result |
|---|---|
| Run Time | 1 minute |
| Adversaries | 5 |
| Indicators | 8 |
| Indicator Attributes | 4 |
| Reports | 1 |
| Report Attributes | 14 |
Intel 471 Geopolitical Reports
| Metric | Result |
|---|---|
| Run Time | 1 minute |
| Adversaries | 5 |
| Reports | 2 |
| Report Attributes | 71 |
Intel 471 Information Reports
| Metric | Result |
|---|---|
| Run Time | 1 minute |
| Adversaries | 4 |
| Adversary Attributes | 8 |
| Indicators | 24 |
| Indicator Attributes | 17 |
| Malware | 5 |
| Reports | 4 |
| Report Attributes | 105 |
Intel 471 Spot Reports
| Metric | Result |
|---|---|
| Run Time | 1 minute |
| Indicators | 3 |
| Indicator Attributes | 1 |
| Malware | 1 |
| Reports | 4 |
| Report Attributes | 29 |
Known Issues / Limitations
- Large report descriptions, embedded images, or attachments may exceed platform or database size limits. In such cases, oversized inline content may be truncated or removed to ensure the report can be successfully ingested.
Change Log
- Version 3.0.0
- Migrated to the Intel 471 Reports API (
api.intel471.cloud/integrations/intel-report/v1). - Updated authentication to use Basic Authentication with
client_idandclient_secret. - Updated Breach Alerts and Spot Reports to leverage the new Reports API stream and detail endpoints.
- Added new feeds for FINTEL Reports, Geopolitical Reports, and Information Reports.
- Implemented handling for
401(authentication) and403(authorization) errors. - Introduced SSL verification and proxy control options for each feed.
- Migrated to the Intel 471 Reports API (
- Version 2.0.2
- Resolved an issue where missing date fields would result in reports not being ingested.
- Version 2.0.1
- Resolved the following issues where:
- Embedded images were stripped out from descriptions.
- Users encountered a
filter-mappingerror when loading MITRE Attack Patterns from the ThreatQ API.
- Improved the HTML formatting for descriptions.
- Added a new entry to the Known Issues / Limitations regarding ingestion behavior of images with long descriptions.
- Updated the minimum ThreatQ version to 5.24.0.
- Resolved the following issues where:
- Version 2.0.0
- Updated minimum ThreatQ version to 5.6.0.
- Added new Breach Alerts feed.
- Added new Spot Reports feed.
- Add support for the following document types:
- Breach Reports
- Intelligence Bulletins
- Underground Pulses
- Threat Briefs
- Whitepapers
- Intelligence Summaries
- Malware Campaigns
- Actor Profiles
- Report descriptions are no longer truncated at 65k characters.
- Added the option to fetch GIR human-readable names to use in attributes.
- Added support for ingesting related malware family entries.
- Added improved country/region attribution support.
- Added support for the following entities: CVE, Malicious Domain, and specific username.
- Added the following configuration fields:
- Relationship Filter - all feeds
- Report Type Filter - Intel 471 Reports feed.
- Indicator Filter - all feeds.
- Adds user field for selecting statuses for certain indicator types
- URL Status (Non-Malicious) - all feeds
- Actor Domain Status - all feeds
- Actor Website Status - all feeds
- Ingest Tags - Intel 471 Reports feed. Tags were previously ingested as attributes.
- Added improved victim attribution support.
- Added support for parsing MITRE ATT&CK techniques for Actor Profiles.
- Resolved an issue where report titles containing 4-byte unicode characters would cause the feed to complete with errors.
- Added performance updates to optimize feed runs and prevent rate limiting.
- Added a new known issue / limitation regarding feed run time frames.
- Version 1.1.1
- Resolved an issue that would occur when the title attribute was not included in the response.
- Version 1.1.0
- Added new Detailed Spot Report supplemental feed call for SPOTREP reports.
- Removed BREACH_ALERT reports to prevent 404 responses from Detailed Reports supplemental call.
- Updated report descriptions to truncate at 32,630 characters.
- Version 1.0.3
- Fix added to handle an empty response from the supplemental feed.
- Version 1.0.2
- Updated report description.
- Version 1.0.1
- Created Indicators and Adversaries have the same attributes as the Report objects.
- Version 1.0.0
- Initial release.
PDF Guides
| Document | ThreatQ Version |
|---|---|
| Intel 471 Reports CDF Guide v3.0.0 | 5.24.0 or Greater |
| Intel 471 Reports CDF Guide v2.0.2 | 5.24.0 or Greater |
| Intel 471 Reports CDF Guide v2.0.1 | 5.24.0 or Greater |
| Intel 471 Reports CDF Guide v2.0.0 | 5.6.0 or Greater |
| Intel 471 Reports CDF Guide v1.1.1 | 4.21.0 or Greater |
| Intel 471 Reports CDF Guide v1.1.0 | 4.21.0 or Greater |
| Intel 471 Reports CDF Guide v1.0.3 | 4.21.0 or Greater |
| Intel 471 Reports CDF Guide v1.0.2 | 4.21.0 or Greater |
| Intel 471 Reports CDF Guide v1.0.1 | 4.21.0 or Greater |
| Intel 471 Reports CDF Guide v1.0.0 | 4.21.0 or Greater |