Skip to main content

Dataminr Pulse - ReGenAI

This Integration is part of the Dataminr Pulse Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

Overview#

Dataminr Pulse brings the most advanced AI-powered real-time intelligence into Cortex XSOAR, easily fitting into your workflows and enabling rapid identification and mitigation of emerging threats so you can deliver faster time to detection and response.

Swiftly Close The Loop From Insight to Response#

Effectively detect, prioritize and manage risk to protect your physical and digital assets with the fastest real-time alerting to discover threats as they unfold.

Broad Global Threat Coverage at Unmatched AI Speed#

Dataminr has been the global leader in AI for risk detection since 2009. Dataminr Pulse is relied on by two thirds of Fortune 100 companies to inform their physical and cybersecurity operations. Every day, the Dataminr multi-modal AI platform analyzes billions of public data inputs in 105 languages from over 500K global sources including the deep and dark web, enabling you to:

  • Gain real-time visibility into deep and dark web sources including markets, forums, paste sites, and ransomware group sites.
  • Get first notice on emerging attacks impacting your network and third parties affecting your business.
  • Detect risk at a global scale and track the emergence and global spread of vulnerabilities so you can proactively mitigate risk.
  • Identify new ransomware groups and track attacks as they happen, giving you visibility of attacks impacting your or third party risk perspective.

Pulse for Cyber Risk Key Use Cases#

  • Cyber-Physical Convergence: Gain real-time intelligence on converged cyber and physical threats, including physical threats to IT and OT infrastructure, network and power outages, disasters, and emerging geopolitical risks.
  • Vulnerability Prioritization: Prioritize patching with visibility to the entire lifecycle of a vulnerability, from pre-CVE to exploitation, while surfacing relevant vulnerabilities in your infrastructure.
  • External Attack Intelligence: Mitigate risk by tracking threats to your company, subsidiaries, and 3rd parties across ransomware, APT groups, leaks, breaches, DDoS, defacement, and malware activity.
  • Digital Risk Detection: Get early warnings of risk to digital assets, including leaked credentials and data, account and domain impersonation, and mentions across the surface deep and dark web.

Accelerate and Enrich SOC Workflows#

  • Accelerate, enrich and trigger triage with contextual intelligence
  • Activate playbooks
  • Improve incident investigation and response
  • Support analysis and threat hunting workflows
  • Determine threat identification, scoring and classification by type, severity and status

Use cases#

  1. Alert Ingestion#

    Fetches the Dataminr Alerts as an XSOAR Incident based on the configuration parameters. This will have three filters available in place. 1) Watchlist Names 2) Query 3) Alert type (severity)

  2. Alert Enrichment#

    Use playbook Retrieve Alerts For IOCs - Dataminr Pulse to enrich XSOAR incidents using Dataminr Alerts.

    • This playbook requires three parameters: 1) Text to enrich 2) Number of alerts to retrieve for each indicator 3) A boolean to use configured watchlist names
    • This playbook will extract indicators from given text (default will be entire incident context).
    • After that it will retrieve alerts for each indicator and will store those alerts into context with key RetrievedDataminrAlerts.

Configure Dataminr Pulse - ReGenAI in Cortex#

  1. Navigate to Settings > Integrations > Servers & Services.
  2. Search for Dataminr Pulse - ReGenAI.
  3. Click Add instance to create and configure a new integration instance.
ParameterDescriptionRequired
Client IDThe Client ID required to authenticate to the service.True
Client SecretThe Client Secret required to authenticate to the service.True
Watchlist NamesProvide the watchlist names from which to fetch the alerts. If not provided, alerts will be fetched from all available watchlists on the platform.False
QueryTerms to search within Dataminr Alerts.False
Alert TypeFilters the incoming alerts with the provided alert type. Default All.False
Max FetchThe maximum number of alerts to fetch each time. If the value is greater than 100, it will be considered as 100. The maximum is 100.False
Source ReliabilityReliability of the source providing the intelligence data.False
Create relationshipsCreate relationships between indicators as part of enrichment.False
Trust any certificate (not secure)Indicates whether to allow connections without verifying the SSL certificate's validity.False
Use system proxy settingsIndicates whether to use XSOAR's system proxy settings to connect to the API.False
Incident typeFalse
Fetch incidentsFalse
Incidents Fetch IntervalThe incident fetch interval.False
First Fetch Time (not supported)This parameter is not supported as Dataminr Pulse API doesn't have time based filtering for fetching of alerts.False
  1. Click Test to validate the URLs, token, and connection.

(Optional) Set up Google Maps in Cortex XSOAR to Display Alert Locations in the Incident Layout#

  1. In Google Cloud Platform, do the following:

    • Create a Google Cloud Project.
    • Enable APIs and Services (API & Services>Dashboard> ENABLE APIS AND SERVICES).
    • Enable Maps JavaScript API.
    • Create the Maps JavaScript API key ( Credentials> CREATE CREDENTIALS>API key).
    • Copy the Maps JavaScript API key.
  2. Add the Maps JavaScript API key to Cortex XSOAR.

    • For XSOAR 6: Select Settings > ABOUT > Troubleshooting > Add Server Configuration. For XSOAR 8: Select Settings & Info > Settings > Server Settings > Add Server Configuration.

    • Add the following key and value:

      KeyValue
      ui.google.api.key<Maps JavaScript API key>
    • Click Save.

Note#

  1. If you detach the out-of-the-box mapper and make changes to it, the pack does not automatically get updates.
    • If you are using a custom incident type, you also need to create custom corresponding incoming mappers.

Troubleshooting#

Known Issue: Custom CVE Indicators being overridden by the default CVE Type in XSOAR 8#

We created a custom indicator type "Dataminr Pulse Vulnerability Indicator" similar to "CVE" so we can show the additional fields in our customized layout. These indicators are extracted from Dataminr Pulse ReGenAI Alerts, but some of them are still being assigned the default "CVE" indicator type instead of our custom "Dataminr Pulse Vulnerability Indicator".

Tips for Handling the Issue#

Manually edit the indicators type from CVE to Dataminr Pulse Vulnerability Indicator that were enriched by Dataminr Pulse ReGenAI Alert.

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

dataminrpulse-watchlists-get#


Retrieves the Watchlists configured on the Dataminr platform.

Base Command#

dataminrpulse-watchlists-get

Input#

There are no input arguments for this command.

Context Output#

PathTypeDescription
DataminrPulse.WatchLists.idNumberAn unique identifier for an individual list. This ID is needed to retrieve alerts for a given list.
DataminrPulse.WatchLists.typeStringThe type of list. Can be one of the Topic, Company, or Custom.
DataminrPulse.WatchLists.nameStringThe name of list as specified in Dataminr platform.
DataminrPulse.WatchLists.subTypeStringThe sub type of list as specified in Dataminr platform.

Command example#

!dataminrpulse-watchlists-get

Context Example#

{
"DataminrPulse": {
"WatchLists": [
{
"id": 1,
"name": "Attack Vendor",
"type": "TOPIC",
"subType": "CYBER"
},
{
"id": 2,
"name": "Cyber-Physical",
"type": "TOPIC",
"subType": "VULNERABILITY"
}
]
}
}

Human Readable Output#

Watchlists#

Watchlist IDWatchlist NameWatchlist TypeWatchlist Sub Type
1Attack VendorTOPICCYBER
2Cyber-PhysicalTOPICVULNERABILITY

dataminrpulse-alerts-get#


Retrieves the alerts as per the provided watchlist_ids or query or configured watchlist_names parameter in integration.

Note: The "from" and "to" arguments should not be included on the first execution, there will not be any "from" or "to" cursor to reference. Only subsequent calls should contain those parameters.

Base Command#

dataminrpulse-alerts-get

Input#

Argument NameDescriptionRequired
watchlist_idsComma-separated set of watchlist IDs.Optional
queryTerms to search within Dataminr Alerts.Optional
fromIt points to a cursor that you want any alerts after. Note that only one of "from" or "to" can be included per request.Optional
toIt points to a cursor that you want any alerts before. Note that only one of "from" and "to" can be included per request.Optional
numMaximum number of alerts to return. 100 is maximum value. Default is 40.Optional
use_configured_watchlist_namesA Boolean indicating that If user does not provide watchlist IDs then it should use configured watchlist names with query parameter. Possible values are: yes, no. Default is yes.Optional

Context Output#

PathTypeDescription
DataminrPulse.Alerts.alertIdStringThe unique identifier of the alert.
DataminrPulse.Alerts.alertTimestampStringThe timestamp when the alert was generated.
DataminrPulse.Alerts.alertType.nameStringThe type of alert.
DataminrPulse.Alerts.alertTopics.idStringThe topic ID associated with the alert.
DataminrPulse.Alerts.alertTopics.nameStringThe topic name associated with the alert.
DataminrPulse.Alerts.alertCompanies.nameStringThe company name is related to the alert.
DataminrPulse.Alerts.alertCompanies.tickerStringThe stock ticker symbol of the company.
DataminrPulse.Alerts.alertSectors.nameStringThe sector name associated with the alert.
DataminrPulse.Alerts.headlineStringThe main headline or summary of the alert.
DataminrPulse.Alerts.subHeadline.titleStringThe subheadline title.
DataminrPulse.Alerts.subHeadline.contentStringThe subheadline detailed content.
DataminrPulse.Alerts.publicPost.timestampStringThe timestamp of the original public post.
DataminrPulse.Alerts.publicPost.hrefStringThe source URL of the public post.
DataminrPulse.Alerts.publicPost.textStringThe text of the public post.
DataminrPulse.Alerts.publicPost.channelsStringThe channels or platforms where the post appeared.
DataminrPulse.Alerts.publicPost.media.typeStringThe type of attached media.
DataminrPulse.Alerts.publicPost.media.hrefStringThe media hyperlink.
DataminrPulse.Alerts.publicPost.englishTextStringThe english text of the public post.
DataminrPulse.Alerts.eventCorroboration.timestampStringThe timestamp of the event corroboration.
DataminrPulse.Alerts.eventCorroboration.summary.titleStringThe title of the event corroboration summary.
DataminrPulse.Alerts.eventCorroboration.summary.contentStringThe content of the event corroboration summary.
DataminrPulse.Alerts.estimatedEventLocation.nameStringThe estimated name or location of the event.
DataminrPulse.Alerts.estimatedEventLocation.coordinatesNumberThe coordinates of the estimated event location.
DataminrPulse.Alerts.estimatedEventLocation.probabilityRadiusNumberThe probability radius of the estimated location.
DataminrPulse.Alerts.assetsMatched.locationAssets.nameStringThe name of the customer location asset.
DataminrPulse.Alerts.assetsMatched.locationAssets.lngNumberThe longitude of the asset.
DataminrPulse.Alerts.assetsMatched.locationAssets.latNumberThe latitude of the asset.
DataminrPulse.Alerts.assetsMatched.locationAssets.distanceFromEventLocationNumberThe distance between the asset and the alert's estimated event location.
DataminrPulse.Alerts.assetsMatched.locationAssets.locationGroups.nameStringThe name of the location group.
DataminrPulse.Alerts.assetsMatched.thirdPartyAssets.nameStringThe name of the third-party asset.
DataminrPulse.Alerts.assetsMatched.thirdPartyAssets.customerProvidedIdStringThe customer-provided unique ID for the asset.
DataminrPulse.Alerts.assetsMatched.travelSegments.nameStringThe name of the travel segment location or asset.
DataminrPulse.Alerts.assetsMatched.travelSegments.lngNumberThe longitude of the asset.
DataminrPulse.Alerts.assetsMatched.travelSegments.latNumberThe latitude of the asset.
DataminrPulse.Alerts.assetsMatched.travelSegments.distanceFromEventLocationNumberThe distance between the asset and the alert's estimated event location.
DataminrPulse.Alerts.assetsMatched.travelSegments.travelTypeStringThe category of travel segment, such as HOTEL or FLIGHT.
DataminrPulse.Alerts.intelAgents.summary.typeStringThe type of the intelligence agent summary.
DataminrPulse.Alerts.intelAgents.summary.titleStringThe title of the intelligence agent summary.
DataminrPulse.Alerts.intelAgents.summary.contentStringThe content of the intelligence agent summary.
DataminrPulse.Alerts.intelAgents.versionStringThe version of the intelligence agent.
DataminrPulse.Alerts.intelAgents.timestampStringThe timestamp of the intelligence agent.
DataminrPulse.Alerts.intelAgents.discoveredEntities.nameStringThe name of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.typeStringThe type of discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.summaryStringThe summary of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.publishedDateStringThe published date of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.products.productNameStringThe product name of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.products.productVendorStringThe product vendor of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.products.productVersionStringThe product version of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.knownExploitedDateStringThe known exploited date of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.epssScoreStringThe EPSS score of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.cvssStringThe CVSS score of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.exploitableStringThe exploitability of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.exploitPocLinksStringThe exploit proof of concept links of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.affectedOperatingSystemsStringThe affected operating systems of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.yaraRulesStringThe YARA rules of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.aliasesStringThe aliases of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.ttps.topLevelTechniqueNameStringThe top-level technique name of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.ttps.techniqueNameStringThe technique name of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.ttps.techniqueIdStringThe technique ID of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.ttps.tacticNameStringThe tactic name of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.countryOfOriginStringThe country of origin of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.threatActorsStringThe threat actors related to malware of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.websiteUrlStringThe website URL associated with the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.locations.addressStringThe address of the location associated with the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.industryStringThe industry in which the discovered entity operates.
DataminrPulse.Alerts.intelAgents.discoveredEntities.primaryLocation.addressStringThe primary address of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.organizationTypeStringThe type of organization associated with the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.headOfOrganizationStringThe individual who heads the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.executivesStringThe executives associated with the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.operatingRegionsStringThe regions in which the discovered entity operates.
DataminrPulse.Alerts.intelAgents.discoveredEntities.addressStringThe address information of the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.ownedByStringThe entity or individual that owns the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.operatedByStringThe entity or individual that operates the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.countryStringThe country in which the discovered entity is located.
DataminrPulse.Alerts.intelAgents.discoveredEntities.timezone.utcOffsetSecondsNumberThe UTC offset in seconds for the entity's timezone.
DataminrPulse.Alerts.intelAgents.discoveredEntities.timezone.displayNameStringThe display name of the entity's timezone.
DataminrPulse.Alerts.intelAgents.discoveredEntities.stateOrProvinceStringThe state or province where the discovered entity is located.
DataminrPulse.Alerts.intelAgents.discoveredEntities.populationStringThe population associated with the discovered entity's location.
DataminrPulse.Alerts.intelAgents.discoveredEntities.travelAdvisories.issuingCountryStringThe country issuing the travel advisory.
DataminrPulse.Alerts.intelAgents.discoveredEntities.travelAdvisories.issuedDateStringThe date when the travel advisory was issued.
DataminrPulse.Alerts.intelAgents.discoveredEntities.travelAdvisories.issuedCountryStringThe country for which the travel advisory was issued.
DataminrPulse.Alerts.intelAgents.discoveredEntities.travelAdvisories.advisoryTextStringThe text content of the travel advisory.
DataminrPulse.Alerts.intelAgents.discoveredEntities.presidentStringThe president associated with the discovered entity's country or organization.
DataminrPulse.Alerts.intelAgents.discoveredEntities.officialLanguagesStringThe official languages spoken in the entity's location.
DataminrPulse.Alerts.intelAgents.discoveredEntities.capitalStringThe capital city associated with the discovered entity's country.
DataminrPulse.Alerts.intelAgents.discoveredEntities.locationTypeStringThe type of location represented by the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.managedByStringThe entity or individual responsible for managing the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.nationalitiesStringThe nationalities associated with the discovered entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.pastRoles.tenureStartDateStringThe start date of the entity's past role.
DataminrPulse.Alerts.intelAgents.discoveredEntities.pastRoles.tenureEndDateStringThe end date of the entity's past role.
DataminrPulse.Alerts.intelAgents.discoveredEntities.pastRoles.roleNameStringThe name of the past role associated with the entity.
DataminrPulse.Alerts.intelAgents.discoveredEntities.currentRoles.tenureStartDateStringThe start date of the entity's current role.
DataminrPulse.Alerts.intelAgents.discoveredEntities.currentRoles.roleNameStringThe name of the current role associated with the entity.
DataminrPulse.Alerts.liveBrief.summaryStringThe live brief summary.
DataminrPulse.Alerts.liveBrief.versionStringThe live brief version.
DataminrPulse.Alerts.liveBrief.timestampStringThe live brief timestamp.
DataminrPulse.Alerts.dataminrAlertUrlStringThe Dataminr alert detail URL.
DataminrPulse.Alerts.alertReferenceTerms.textStringThe reference keywords or terms for the alert.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.idStringThe vulnerability ID.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.publishedDateStringThe published date of the vulnerability.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.knownExploitedDateStringThe known exploited date of the vulnerability.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.epssScoreStringThe EPSS score of the vulnerability.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.cvssNumberThe CVSS score of the vulnerability.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.products.productNameStringThe vulnerable product name.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.products.productVendorStringThe vulnerable product vendor.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.products.productVersionStringThe vulnerable product version.
DataminrPulse.Alerts.metadata.cyber.vulnerabilities.exploitPocLinksStringThe exploit PoC links for the vulnerability.
DataminrPulse.Alerts.metadata.cyber.URL.nameStringThe related URL name.
DataminrPulse.Alerts.metadata.cyber.addresses.ipStringThe IP address involved.
DataminrPulse.Alerts.metadata.cyber.addresses.portNumberThe port number involved.
DataminrPulse.Alerts.metadata.cyber.addresses.versionStringThe protocol or software version of the address.
DataminrPulse.Alerts.metadata.cyber.addresses.typeStringThe type of the address.
DataminrPulse.Alerts.metadata.cyber.malware.nameStringThe malware name.
DataminrPulse.Alerts.metadata.cyber.malware.affectedOperatingSystemsStringThe affected operating systems.
DataminrPulse.Alerts.metadata.cyber.threatActors.nameStringThe threat actor name.
DataminrPulse.Alerts.metadata.cyber.threatActors.aliasesStringThe threat actor aliases.
DataminrPulse.Alerts.metadata.cyber.threatActors.countriesOfOriginStringThe countries of origin of the threat actor.
DataminrPulse.Alerts.metadata.cyber.asOrgs.asnStringThe autonomous system number.
DataminrPulse.Alerts.metadata.cyber.asOrgs.asOrgStringThe autonomous system organization.
DataminrPulse.Alerts.metadata.cyber.hashValues.valueStringThe hash value.
DataminrPulse.Alerts.metadata.cyber.hashValues.typeStringThe hash type.
DataminrPulse.Alerts.listsMatched.idStringThe matched list ID.
DataminrPulse.Alerts.listsMatched.nameStringThe matched list name.
DataminrPulse.Alerts.listsMatched.subTypeStringThe subtype of the matched list.
DataminrPulse.Alerts.listsMatched.topicIdsStringThe topic IDs of the matched list.
DataminrPulse.Alerts.linkedAlerts.countNumberThe count of linked alerts.
DataminrPulse.Alerts.linkedAlerts.parentAlertIdStringThe parent alert ID of the linked alert.
DataminrPulse.Cursor.fromStringThe "from" points to a cursor that specifies the alerts you want after it.
DataminrPulse.Cursor.toStringThe "to" points to a cursor that specifies the alerts you want before it.

Command example#

!dataminrpulse-alerts-get num=1

Context Example#

{
"DataminrPulse": {
"Alerts": [
{
"alertId": "DUMMY_ALERT_ID",
"alertTimestamp": "2025-07-07T19:19:00.397Z",
"alertType": {
"name": "Alert"
},
"alertTopics": [
{
"id": "DUMMY_TOPIC_ID",
"name": "DUMMY_TOPIC_NAME"
}
],
"alertCompanies": [
{
"name": "DUMMY_COMPANY",
"ticker": "DUMMY_TICKER"
}
],
"alertSectors": [
{
"name": "DUMMY_SECTOR"
}
],
"headline": "Spike detected in discussion related to threat actor DUMMY_ACTOR.",
"subHeadline": {
"title": "DUMMY_TITLE",
"content": [
"DUMMY_CONTENT"
]
},
"publicPost": {
"timestamp": "2025-01-01T00:00:00.000Z",
"href": "DUMMY_URL",
"channels": [
"DUMMY_CHANNEL"
],
"media": [
{
"type": "photo",
"href": "DUMMY_IMAGE_URL"
}
]
},
"estimatedEventLocation": {
"name": "DUMMY_LOCATION",
"coordinates": [
0,
0
],
"probabilityRadius": 0
},
"intelAgents": [
{
"summary": [
{
"type": [
"CYBER"
],
"title": "Background Information",
"content": [
"This is a placeholder description for background information related to the issue."
]
},
{
"type": [
"CYBER"
],
"title": "Current Status",
"content": [
"This is a placeholder description for the current status of the issue."
]
},
{
"type": [
"CYBER"
],
"title": "Impact",
"content": [
"This is a placeholder description for the potential impact of the issue."
]
}
],
"version": "prior",
"timestamp": "2025-01-01T00:00:00.000Z",
"discoveredEntities": [
{
"name": "DUMMY_ENTITY",
"type": "threatActor",
"aliases": [
"DUMMY_ALIAS"
]
},
{
"name": "DUMMY_ENTITY02",
"type": "malware",
"affectedOperatingSystems": [
"DUMMY_OS"
]
},
{
"name": "DUMMY_ENTITY03",
"type": "vulnerability",
"publishedDate": "2025-01-01T00:00:00.000Z",
"epssScore": 2.0,
"cvss": 2.5,
"products": [
{
"productName": "DUMMY_PRODUCT",
"productVendor": "DUMMY_VENDOR",
"productVersion": "DUMMY_VERSION"
}
],
"exploitPocLinks": [
"DUMMY_LINK"
]
}
]
}
],
"liveBrief": [
{
"summary": "DUMMY_LIVEBRIEF",
"version": "prior",
"timestamp": "2025-01-01T00:00:00.000Z"
}
],
"dataminrAlertUrl": "https://app.dataminr.com/#alertDetail/DUMMY",
"alertReferenceTerms": [
{
"text": "DUMMY_REF_TERM"
}
],
"metadata": {
"cyber": {
"vulnerabilities": [
{
"id": "DUMMY_VULN",
"publishedDate": "2025-01-01T00:00:00.000Z",
"epssScore": 2.0,
"cvss": 2.5,
"products": [
{
"productName": "DUMMY_PRODUCT",
"productVendor": "DUMMY_VENDOR",
"productVersion": "DUMMY_VERSION"
}
],
"exploitPocLinks": [
"DUMMY_LINK"
]
}
],
"URL": [
{
"name": "DUMMY_URL"
}
],
"addresses": [
{
"ip": "0.0.0.0",
"port": 22,
"version": "DUMMY_VERSION"
}
],
"malware": [
{
"name": "DUMMY_MALWARE"
}
],
"threatActors": [
{
"name": "DUMMY_ACTOR"
}
],
"asOrgs": [
{
"asn": "DUMMY_ASN",
"asOrg": "DUMMY_ORG"
}
],
"hashValues": [
{
"value": "DUMMY_HASH",
"type": "DUMMY_HASH_TYPE"
}
]
}
},
"listsMatched": [
{
"id": 3,
"name": "Data Security",
"subType": "CYBER",
"topicIds": [
"DUMMY_TOPIC_ID"
]
}
],
"linkedAlerts": [
{
"count": 4,
"parentAlertId": "DUMMY_PARENT_ID"
}
]
}
],
"Cursor": {
"from": "DUMMY_CURSOR02",
"to": "DUMMY_CURSOR01"
}
}
}

Human Readable Output#

Alerts#

Alert TypeAlert IDAlert NameIntel Agents SummaryIntel Agents Discovered EntitiesLive BriefWatchlist NameAlert TimeAlert LocationPost LinkAlert Topics
AlertDUMMY_ALERT_IDSpike detected in discussion related to threat actor DUMMY_ACTOR.- type: CYBER
title: Background Information
content: This is a placeholder description for background information related to the issue.
- type: CYBER
title: Current Status
content: This is a placeholder description for the current status of the issue.
- type: CYBER
title: Impact
content: This is a placeholder description for the potential impact of the issue.
- name: DUMMY_ENTITY
type: threatActor
aliases: DUMMY_ALIAS
- name: DUMMY_ENTITY02
type: malware
affectedOperatingSystems: DUMMY_OS
- name: DUMMY_ENTITY03
type: vulnerability
publishedDate: 2025-01-01T00:00:00.000Z
epssScore: 2.0
cvss: 2.5
products:
- productName: DUMMY_PRODUCT
productVendor: DUMMY_VENDOR
productVersion: DUMMY_VERSION
exploitPocLinks: DUMMY_LINK
- summary: DUMMY_LIVEBRIEF
version: prior
timestamp: 2025-01-01T00:00:00.000Z
Data Security2025-07-07T19:19:00.397ZDUMMY_LOCATIONDUMMY_URL- id: DUMMY_TOPIC_ID
name: DUMMY_TOPIC_NAME

Cursor for pagination#

fromto
DUMMY_CURSOR02DUMMY_CURSOR01

Migration Guide#

Migrated Commands#

Below is the list of commands that have been migrated from the "Dataminr Pulse" integration to the "Dataminr Pulse - ReGenAI" integration.

  • dataminrpulse-alerts-get
  • dataminrpulse-watchlists-get

Deprecated Commands#

The following command from the previous integration has been deprecated from the Dataminr Pulse API side with no replacement.

  • dataminrpulse-related-alerts-get