Flashpoint (Deprecated)
Flashpoint Pack.#
This Integration is part of theDeprecated
Use Flashpoint Ignite instead.
Deprecated. Use Flashpoint Ignite instead. This integration was integrated and tested with API version 1.0.0 and 4.0.0 of Flashpoint.
#
Auto Extract IndicatorBoth incident types Flashpoint Alerts and Flashpoint Compromised Credentials support auto extraction feature by default that extract indicators and enriches their reputations using commands and scripts defined for the indicator type (Refer this for more detail).
#
Configure Flashpoint on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Flashpoint.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Fetch incidents False Incident type False Server URL Server URL to connect to Flashpoint. True API Key True Maximum number of incidents per fetch The maximum limit is 100 for alerts and 1000 for compromised credentials. False First fetch time interval Date or relative timestamp to start fetching the incidents from. (Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc). False Fetch Type Whether to fetch the Flashpoint alerts or the compromised credentials. Would choose "Compromised Credentials" if nothing selected. False Fetch fresh compromised credentials alerts Whether to fetch the fresh compromised credentials alerts or not. False Trust any certificate (not secure) False Use system proxy settings False Create relationships Create relationships between indicators as part of Enrichment. False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
ipLooks up details of an IP indicator. The reputation of the IP address is considered malicious if there's at least one IOC event in the Flashpoint database that matches the IP indicator. Alternatively, the IP address is considered suspicious if it matches any one of the Torrent's Peer IP Address or Forum Visit's Peer IP Address.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP address to check. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
IP.Address | string | The IP address. |
IP.Malicious.Description | string | The description of the malicious indicator. |
IP.Malicious.Vendor | string | The vendor used to calculate the severity of the IP address. |
Flashpoint.IP.Event.Href | string | A list of reference links of the indicator. |
Flashpoint.IP.Event.Address | string | The IP address of the indicator. |
Flashpoint.IP.Event.EventDetails | string | The event details in which the indicator was observed. |
Flashpoint.IP.Event.Category | string | The category of the indicator. |
Flashpoint.IP.Event.Fpid | string | The Flashpoint ID of the indicator. |
Flashpoint.IP.Event.Timestamp | string | The time and date that the indicator was observed. |
Flashpoint.IP.Event.Type | string | The indicator type. |
Flashpoint.IP.Event.Uuid | string | The UUID of the indicator. |
Flashpoint.IP.Event.Comment | string | The comment that was provided when the indicator was observed. |
IP.Relationships.EntityA | string | The source of the relationship. |
IP.Relationships.EntityB | string | The destination of the relationship. |
IP.Relationships.Relationship | string | The name of the relationship. |
IP.Relationships.EntityAType | string | The type of the source of the relationship. |
IP.Relationships.EntityBType | string | The type of the destination of the relationship. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint IP address reputation for 210.122.7.129Reputation: Malicious
#
Events in which this IOC observedDate Observed (UTC) | Name | Tags |
---|---|---|
Feb 12, 2018 21:46 | Lazarus Resurfaces, Targets Global Banks and Bitcoin Users | source:OSINT |
All events and details (fp-tools): https://fp.tools/home/search/iocs?group=indicator&ioc_type=ip-dst%2Cip-src&ioc_value=210.122.7.129
#
domainLookup the "Domain" type indicator details. The reputation of Domain is considered Malicious if there's at least one IOC event in Flashpoint database matching the Domain indicator.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain name to check. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Flashpoint.Domain.Event.Href | string | A list of reference links of the indicator. |
Flashpoint.Domain.Event.Domain | string | The domain of the indicator. |
Flashpoint.Domain.Event.EventDetails | string | The event details in which the indicator was observed. |
Flashpoint.Domain.Event.Category | string | The category of the indicator. |
Flashpoint.Domain.Event.Fpid | string | The Flashpoint ID of the indicator. |
Flashpoint.Domain.Event.Timestamp | string | The time and date that the indicator was observed. |
Flashpoint.Domain.Event.Type | string | The indicator type. |
Flashpoint.Domain.Event.Uuid | string | The UUID of the indicator. |
Flashpoint.Domain.Event.Comment | string | The comment that was provided when the indicator was observed. |
Domain.Malicious.Description | string | The description of the malicious indicator. |
Domain.Malicious.Vendor | string | Vendor of malicious indicator. |
Domain.Name | string | Name of domain. |
Domain.Relationships.EntityA | string | The source of the relationship. |
Domain.Relationships.EntityB | string | The destination of the relationship. |
Domain.Relationships.Relationship | string | The name of the relationship. |
Domain.Relationships.EntityAType | string | The type of the source of the relationship. |
Domain.Relationships.EntityBType | string | The type of the destination of the relationship. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Domain reputation for subaat.comReputation: Malicious
#
Events in which this IOC observedDate Observed (UTC) | Name | Tags |
---|---|---|
Sep 25, 2019 19:51 | Gorgon Group actor profile | misp-galaxy:mitre-enterprise-attack-attack-pattern=“Spearphishing Attachment - T1193”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Scripting - T1064”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Command-Line Interface - T1059”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“System Information Discovery - T1082”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Remote Services - T1021”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Exfiltration Over Command and Control Channel - T1041”, os:Windows, source:phishing, type:RAT, malware🐀Quasar, malware:banker:Lokibot, filename: njrat.exe, file_name: excel.exe |
All events and details (fp-tools): https://fp.tools/home/search/iocs?group=indicator&ioc_type=domain&ioc_value=subaat.com
#
filenameLookup the "Filename" type indicator details. The reputation of Filename is considered Malicious if there's at least one IOC event in Flashpoint database matching the Filename indicator.
#
Base Commandfilename
#
InputArgument Name | Description | Required |
---|---|---|
filename | The file name to check. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Flashpoint.Filename.Event.Href | string | A list of reference links of the indicator. |
Flashpoint.Filename.Event.Filename | string | Filename of the indicator |
Flashpoint.Filename.Event.EventDetails | string | The event details in which the indicator was observed. |
Flashpoint.Filename.Event.Category | string | The category of the indicator. |
Flashpoint.Filename.Event.Fpid | string | The Flashpoint ID of the indicator. |
Flashpoint.Filename.Event.Timestamp | string | The time and date that the indicator was observed. |
Flashpoint.Filename.Event.Type | string | The indicator type. |
Flashpoint.Filename.Event.Uuid | string | The UUID of the indicator. |
Flashpoint.Filename.Event.Comment | string | The comment that was provided when the indicator was observed. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Filename reputation for .lockedReputation: Malicious
#
Events in which this IOC observedDate Observed (UTC) | Name | Tags |
---|---|---|
Oct 24, 2019 16:30 | LockerGoga | malware:ransomware:lockergoga, report:lKyimEX1TWS8x6AtdiJ_vA, report:jEteM4YxQZCdm4macbE3vQ, report:w0fL5MgoQ_Wih8XyB6Lowg, report:7t-BsuFKTL-HJWbid8nupg |
All events and details (fp-tools): https://fp.tools/home/search/iocs?group=indicator&ioc_type=filename&ioc_value=.locked
#
urlLookup the "URL" type indicator details. The reputation of Url is considered Malicious if there's at least one IOC event in Flashpoint database matching the Url indicator.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | The url to check. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Flashpoint.Url.Event.Href | string | A list of reference links of the indicator. |
Flashpoint.Url.Event.Url | string | Url of the indicator |
Flashpoint.Url.Event.EventDetails | string | The event details in which the indicator was observed. |
Flashpoint.Url.Event.Category | string | The category of the indicator. |
Flashpoint.Url.Event.Fpid | string | The Flashpoint ID of the indicator. |
Flashpoint.Url.Event.Timestamp | string | The time and date that the indicator was observed. |
Flashpoint.Url.Event.Type | string | The indicator type. |
Flashpoint.Url.Event.Uuid | string | The UUID of the indicator. |
Flashpoint.Url.Event.Comment | string | The comment that was provided when the indicator was observed. |
URL.Malicious.Description | string | The description of the malicious indicator. |
URL.Malicious.Vendor | string | Vendor of malicious url. |
URL.Data | string | The URL |
URL.Relationships.EntityA | string | The source of the relationship. |
URL.Relationships.EntityB | string | The destination of the relationship. |
URL.Relationships.Relationship | string | The name of the relationship. |
URL.Relationships.EntityAType | string | The type of the source of the relationship. |
URL.Relationships.EntityBType | string | The type of the destination of the relationship. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint URL reputation for 92.63.197.153/krabaldento.exeReputation: Malicious
#
Events in which this IOC observedDate Observed (UTC) | Name | Tags |
---|---|---|
Oct 24, 2019 16:30 | GandCrab 2019 | malware:ransomware:GandCrab, report:lKyimEX1TWS8x6AtdiJ_vA, report:7t-BsuFKTL-HJWbid8nupg |
All events and details (fp-tools): https://fp.tools/home/search/iocs?group=indicator&ioc_type=url&ioc_value=92.63.197.153/krabaldento.exe
#
fileLookup the "File" type indicator details. The reputation of File-hash is considered Malicious if there's at least one IOC event in Flashpoint database matching the File-hash indicator.
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | A list of hashes of the file to query. Supports MD5, SHA1 and SHA256. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Flashpoint.File.Event.Href | string | A list of reference links of the indicator. |
Flashpoint.File.Event.MD5 | string | MD5 file hash of the indicator |
Flashpoint.File.Event.SHA1 | string | SHA1 file hash of the indicator |
Flashpoint.File.Event.SHA256 | string | SHA256 file hash of the indicator |
Flashpoint.File.Event.EventDetails | string | The event details in which the indicator was observed. |
Flashpoint.File.Event.Category | string | The category of the indicator. |
Flashpoint.File.Event.Fpid | string | The Flashpoint ID of the indicator. |
Flashpoint.File.Event.Timestamp | string | The time and date that the indicator was observed. |
Flashpoint.File.Event.Type | string | The indicator type. |
Flashpoint.File.Event.Uuid | string | The UUID of the indicator. |
Flashpoint.File.Event.Comment | string | The comment that was provided when the indicator was observed. |
File.Malicious.Description | string | The description of the malicious indicator. |
File.Malicious.Vendor | string | Vendor of malicious file. |
File.MD5 | string | MD5 type file. |
File.SHA1 | string | SHA1 type file. |
File.SHA256 | string | SHA256 type file. |
File.Relationships.EntityA | string | The source of the relationship. |
File.Relationships.EntityB | string | The destination of the relationship. |
File.Relationships.Relationship | string | The name of the relationship. |
File.Relationships.EntityAType | string | The type of the source of the relationship. |
File.Relationships.EntityBType | string | The type of the destination of the relationship. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint File reputation for ab09761ad832efb9359fac985d1a2ab74f8a8d182d7b71188a121b850b80dfe5Reputation: Malicious
#
Events in which this IOC observedDate Observed (UTC) | Name | Tags |
---|---|---|
Dec 19, 2019 06:01 | Gandcrab | source:VirusTotal, type:Ransomware, gandcrab, malware:GandCrab, os:Windows |
Jul 17, 2019 18:02 | win_ransomware_generic | source:VirusTotal, type:Ransomware, win_ransomware_generic, os:Windows |
All events and details (fp-tools): https://fp.tools/home/search/iocs?group=indicator&ioc_type=md5%2Csha1%2Csha256%2Csha512&ioc_value=ab09761ad832efb9359fac985d1a2ab74f8a8d182d7b71188a121b850b80dfe5
#
emailLookup the "Email" type indicator details. The reputation of Email is considered Malicious if there's at least one IOC event in Flashpoint database matching the Email indicator.
#
Base Commandemail
#
InputArgument Name | Description | Required |
---|---|---|
The email to check. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Flashpoint.Email.Event.Href | string | A list of reference links of the indicator. |
Flashpoint.Email.Event.EventDetails | string | The event details in which the indicator was observed. |
Flashpoint.Email.Event.Category | string | The category of the indicator. |
Flashpoint.Email.Event.Fpid | string | The Flashpoint ID of the indicator. |
Flashpoint.Email.Event.Timestamp | string | The time and date that the indicator was observed. |
Flashpoint.Email.Event.Type | string | The indicator type. |
Flashpoint.Email.Event.Uuid | string | The UUID of the indicator. |
Flashpoint.Email.Event.Comment | string | The comment that was provided when the indicator was observed. |
Account.Email.Malicious.Description | string | The description of the malicious indicator. |
Account.Email.Malicious.Vendor | string | Vendor of Malicious email. |
Account.Email.Name | string | Name of indicator. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Email reputation for qicifomuejijika@o2.plReputation: Malicious
#
Events in which this IOC observedDate Observed (UTC) | Name | Tags |
---|---|---|
Oct 24, 2019 16:30 | LockerGoga | malware:ransomware:lockergoga, report:lKyimEX1TWS8x6AtdiJ_vA, report:jEteM4YxQZCdm4macbE3vQ, report:w0fL5MgoQ_Wih8XyB6Lowg, report:7t-BsuFKTL-HJWbid8nupg |
All events and details (fp-tools): https://fp.tools/home/search/iocs?group=indicator&ioc_type=email-dst%2Cemail-src%2Cemail-src-display-name%2Cemail-subject&ioc_value=qicifomuejijika%40o2.pl
#
flashpoint-search-intelligence-reportsSearch for the Intelligence Reports using a keyword
#
Base Commandflashpoint-search-intelligence-reports
#
InputArgument Name | Description | Required |
---|---|---|
report_search | Search report using keyword or text. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Report | unknown | List of reports based on specified search query or keyword |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Intelligence reports related to search: isisTop 5 reports:
ISIS Media Rebuilds Following Sweeping Suspensions Summary: Despite Telegram?s aggressive and sustained targeting of jihadists on its platform, ISIS?s official media and supportive groups are beginning to rebuild on Telegram.
Telegram Targets ISIS Propaganda in Largest Platform Purge Summary: Between November 22 and 24, 2019, Telegram removed more than 7,000 jihadist channnels and bots from its platform?in the largest purge of ISIS propaganda in Telegram?s history. The takedown drastically impacted ISIS propaganda dissemination, knocking out critical channels and groups, many of which had operated uninterrupted for years.
Global Spotlight - Iran: Key Developments ThisWeek Summary: N/A
Dropbox Account Disseminates Far-Right Extremist Content Summary: Flashpoint analysts have identified a Dropbox account called ?NS Library? belonging to a far-right extremist containing over 200 white supremacist publications and guides?including neo-Nazi literature and propaganda, instruction manuals for making homemade weapons, survival guides, attackers? manifestos, and workout manuals, among other content.
ISIS Activity Continues Unabated Following al-Baghdadi’s Death Summary: On October 26, 2019, ISIS?s former leader Abu Bakr al-Baghdadi killed himself in the midst of a US military operation. Less than a week later, ISIS confirmed al-Baghdadi?s death, and announced that Abu Ibrahim al-Hashimi al-Qurashi is the group?s new leader. Link to Report-search on Flashpoint platform: https://fp.tools/home/search/reports?query=isis
#
flashpoint-get-single-intelligence-reportGet single report details using the report id. The report id can be known from output context path (Flashpoint.Report.ReportId) of report-search command or some other investigation.
#
Base Commandflashpoint-get-single-intelligence-report
#
InputArgument Name | Description | Required |
---|---|---|
report_id | The report id of the report for which the details are to be fetched. The report id can be known from output context path (Flashpoint.Report.ReportId) of report-search command or some other investigation. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Report.NotifiedAt | string | Notify date of report. |
Flashpoint.Report.PlatformUrl | string | Platform url of report. It helps to redirect flashpoint platform. |
Flashpoint.Report.PostedAt | number | posted date of report. |
Flashpoint.Report.Summary | string | Summary of report. |
Flashpoint.Report.Title | string | Title of the report. |
Flashpoint.Report.UpdatedAt | string | Last updated date of report. |
Flashpoint.Report.ReportId | string | Unique id of the report. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Intelligence Report details#
Below are the details found:Title | Date Published (UTC) | Summary | Tags |
---|---|---|---|
ISIS Supporters Warn of the Risks Associated with Exif Data | Sep 23, 2019 20:27 | On September 17, 2019, multiple pro-ISIS Telegram groups disseminated a message warning of the dangers of exposed exif data?a type of metadata showing GPS coordinates, time, and date the image was taken and the make and model of the device used?that is typically captured from images taken by a phone or camera, unless the security settings are properly configured. | Intelligence Report, Law Enforcement & Military, Physical Threats, Jihadist, Propaganda, Terrorism, Global |
#
flashpoint-get-related-reportsGet related reports for a particular report using the report-id. The report id can be known from output context path (Flashpoint.Report.ReportId) of report-search command or some other investigation.
#
Base Commandflashpoint-get-related-reports
#
InputArgument Name | Description | Required |
---|---|---|
report_id | The report-id of the report of which the related reports are to be fetched. The report id can be known from output context path (Flashpoint.Report.ReportId) of report-search command or some other investigation. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Report | unknown | Display list of related report based on report fpid. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Intelligence related reports:Top 5 related reports:
Neo-Nazi Telegram Channel Incites Violence, Spreads Extremist Content Summary: In August 2019, militant white supremacist channel ?Stack the Bodies to God? appeared on Telegram, inciting violence and providing a large quantity of informational resources?including extremist publications, tactical manuals, survival guides, guerrilla warfare tactics, instructions for making homemade explosives, weapons, and ricin, and internet security tips.
Atomwaffen Division Resumes Recruitment Activity Summary: On September 30, 2019, the admin of ?The_Bowlcast? Telegram channel promoted the launch of the militant, white supremacist group ?Atomwaffen Division?s? (AWD) latest website and new video dubbed ?Nuclear Congress 2019,? which subtlely discusses the need for AWD to accomplish its goals?alluding to the need for new financing and recruitment.
“Vorherrschaft Division” (VSD): A Nascent Militant White Supremacy Group Summary: On June 14, 2019, a militant white supremacy group called ?Vorherrschaft Division? (VSD) announced its creation in its Telegram channel “Vorherrschaft division propaganda posting.”
“Boogaloo”: Accelerationists’ Latest Call to Action Summary: The term ?boogaloo? (also known as ?the boogaloo? and ?big igloo?) is the latest term used by accelerationists?advocates of hastening the collapse of society through violence?to describe an armed revolution against society to rebuild a white-ethno state.
Far-Right Prepares for “Meme War 2020” Summary: Members of the far-right community are preparing for what they call ?meme war 2020??content spread via social media focused on left-leaning targets?in the lead up to the 2020 U.S. presidential election. Link to the given Report on Flashpoint platform: https://fp.tools/home/intelligence/reports/report/tiPqg51OQpOTsoFyTaYa_w#detail
#
flashpoint-get-single-eventRetrieves the details of a single event using event UUID or FPID. To retrieve the event id, run the get-events command and see the value under the Flashpoint.Event.EventId context path. or indicator reputation command response or some other investigation.
#
Base Commandflashpoint-get-single-event
#
InputArgument Name | Description | Required |
---|---|---|
event_id | The UUID or FPID that identifies a particular event. The event id can be fetched from output context path (Flashpoint.Event.EventId) get-events command or indicator reputation command response or some other investigation. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Event.ObservedTime | string | The date that the event was triggered. |
Flashpoint.Event.EventCreatorEmail | string | The email address of the event creator. |
Flashpoint.Event.Href | string | The display event reference. |
Flashpoint.Event.MalwareDescription | string | The description of the malware. |
Flashpoint.Event.Tags | unknown | The display event tags. |
Flashpoint.Event.EventId | string | The display event ID (event fpid). |
Flashpoint.Event.Name | string | The name of the event. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Event details#
Below are the detail found:Observed time (UTC) | Name | Tags | Malware Description |
---|---|---|---|
Jun 18, 2019 22:08 | CryptingService_4c0d570ecdf23529c91b8decf27107db5c5e9430_2019-06-17T03:01:03.000Z | source:CryptingService2 | \"Quasar\" is a publicly available, open-source remote access trojan (RAT) for Microsoft Windows operating systems written in the C# programming language. Quasar is authored by GitHub user "MaxXor" and publicly hosted as a GitHub repository. The functionality of the Quasar malware includes remote file management on the infected machine, registry alterations, recording the actions of the victim, and establishing remote desktop connections. |
#
flashpoint-get-eventsSearches for events within the specified time-period, the report fpid, or attack IDs.
#
Base Commandflashpoint-get-events
#
InputArgument Name | Description | Required |
---|---|---|
time_period | The time period for the search. | Optional |
report_fpid | The report fpid. To retrieve the report fpid, run the related-reports command. | Optional |
limit | Specify the limit on the no. of record. Default is 10. | Optional |
attack_ids | A comma-separated list of attack IDs for which to search. Attack IDs can be found in event information or on the Flashpoint platform by filtering events by attack IDs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Event | unknown | A list of multiple events. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Events#
Below are the detail found:Observed time (UTC) | Name | Tags | Malware Description |
---|---|---|---|
Dec 11, 2019 10:16 | CryptingService_4273f08ae5f229f6301e7e0cc9e9005cebc4da20_2019-12-11T03:01:01.000Z | source:CryptingService2 | dummy_malware_description1 |
Dec 11, 2019 09:00 | NetWire | source:VirusTotal, T1060, netwire, T1056, os:Windows, type:RAT, malware:NetWire, T1082, T1116, T1113, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Registry Run Keys / Start Folder - T1060”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Input Capture - T1056”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“System Information Discovery - T1082”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Code Signing - T1116”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Screen Capture - T1113” | dummy_malware_description2 |
Dec 11, 2019 08:00 | CyberGate | source:VirusTotal, os:Windows, type:RAT, cybergate, malware:CyberGate | dummy_malware_description3 |
Dec 11, 2019 07:04 | ROKRAT_Nov17_1 | source:VirusTotal, T1057, T1105, T1063, os:Windows, target:SouthKorea, T1003, T1012, T1082, rokrat_nov17_1, malware:Rokrat, T1071, exfil:C2, T1102, T1041, T1056, type:RAT, T1497, T1113, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Process Discovery - T1057”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Remote File Copy - T1105”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Security Software Discovery - T1063”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Credential Dumping - T1003”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Query Registry - T1012”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“System Information Discovery - T1082”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Standard Application Layer Protocol - T1071”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Web Service - T1102”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Exfiltration Over Command and Control Channel - T1041”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Input Capture - T1056”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Screen Capture - T1113” | dummy_malware_description4 |
Dec 11, 2019 07:04 | Sodinokibi_Unreachable_After_MZ_Check | source:VirusTotal, sodinokibi_unreachable_after_mz_check | dummy_malware_description5 |
Dec 11, 2019 07:04 | MegaCortex_Load_Dinkum_CLib | source:VirusTotal, megacortex_load_dinkum_clib, malware:MegaCortex, type:Ransomware, os:Windows | dummy_malware_description6 |
Dec 11, 2019 07:04 | Command_Line_Options | source:VirusTotal, command_line_options | dummy_malware_description7 |
Dec 11, 2019 06:17 | CryptingService_74dd32ce57900738cba4d945e4619289ff040a9e_2019-12-11T03:01:01.000Z | source:CryptingService2 | dummy_malware_description8 |
Dec 11, 2019 06:03 | Gandcrab | source:VirusTotal, type:Ransomware, gandcrab, malware:GandCrab, os:Windows | dummy_malware_description9 |
Dec 11, 2019 06:00 | botox_lampeduza_amaterasu_output5E0600 | source:VirusTotal, botox_lampeduza_amaterasu_output5e0600 | dummy_malware_description10 |
Dec 11, 2019 04:17 | CryptingService_e2f163c72837c6b4386ef9158d017418ab149b13_2019-12-11T03:01:01.000Z | source:CryptingService2 | dummy_malware_description11 |
Dec 11, 2019 04:16 | CryptingService_2c13004c346bf79bbec61f6a65fb5b11d5c6f557_2019-12-11T02:01:02.000Z | source:CryptingService2 | dummy_malware_description12 |
Dec 11, 2019 04:16 | CryptingService_5eda60cd7c1d4e5dd4fc5e0d3746bd4879de3959_2019-12-11T03:01:01.000Z | source:CryptingService2 | dummy_malware_description13 |
Dec 11, 2019 04:16 | CryptingService_981ad08f56f265e9e7209e09e3842d8a6b7f7563_2019-12-11T03:01:01.000Z | source:CryptingService2 | dummy_malware_description14 |
Dec 11, 2019 04:16 | CryptingService_7dbfe923559cbb91031dbe2b616c16f5aa40233f_2019-12-11T02:01:02.000Z | source:CryptingService2 | dummy_malware_description15 |
Dec 11, 2019 04:00 | cobalt_beacon | source:VirusTotal, cobalt_beacon | dummy_malware_description16 |
Dec 10, 2019 19:00 | Loki | source:VirusTotal, type:Stealer, malware:Loki, loki, os:Windows | dummy_malware_description17 |
Dec 10, 2019 19:00 | crime_alina_pos_3 | source:VirusTotal, crime_alina_pos_3, type:POS, malware:Alina | dummy_malware_description18 |
Dec 10, 2019 19:00 | Kovter | source:VirusTotal, actor:KovCoreG, kovter, os:Windows, type:Trojan, malware:Kovter | dummy_malware_description19 |
Dec 10, 2019 17:24 | zeroclear Oilrig | origin:Iran, actor:APT34, malware:ransomware:zeroclear | dummy_malware_description20 |
All events and details (fp-tools): https://fp.tools/home/search/iocs
#
flashpoint-common-lookupLookup any type of indicator
#
Base Commandflashpoint-common-lookup
#
InputArgument Name | Description | Required |
---|---|---|
indicator | The indicator type, for example, domain, ip, email, url, and so on. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint reputation for mondns.myftp.bizReputation: Malicious
#
Events in which this IOC observedDate Observed (UTC) | Name | Tags |
---|---|---|
Oct 11, 2019 15:30 | ModiRAT | misp-galaxy:mitre-enterprise-attack-attack-pattern=“Deobfuscate/Decode Files or Information - T1140”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“System Owner/User Discovery - T1033”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“System Information Discovery - T1082”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Screen Capture - T1113”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Custom Command and Control Protocol - T1094”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Data Encoding - T1132”, misp-galaxy:mitre-enterprise-attack-attack-pattern=“Uncommonly Used Port - T1065”, malware:ModiRAT, type:RAT, os:Windows, report:FQmMHh1rR_WuGd_PNVv-bQ |
#
flashpoint-get-forum-detailsRetrieves forum details using the forum ID. To retrieve the forum ID run the flashpoint-search-forum-posts command and see the value under the following context paths, Flashpoint.Forum.ForumId or Flashpoint.Forum.Post.Forum.id.
#
Base Commandflashpoint-get-forum-details
#
InputArgument Name | Description | Required |
---|---|---|
forum_id | Specify forum id of the forum for which the details are to be fetched. The forum id can be known from context path (Flashpoint.Forum.ForumId or Flashpoint.Forum.Post.Forum.id) of flashpoint-search-forum-posts command or some other investigation. | Required |
Context Output#
Path | Type | Description |
---|---|---|
Flashpoint.Forum.Description | string | The detailed information of the supplied forum ID. |
Flashpoint.Forum.Hostname | string | The host details of the supplied forum ID. |
Flashpoint.Forum.Name | string | The name of the forum. |
Flashpoint.Forum.Stats | Unknown | The displayed statistical information such as the number of posts, rooms, threads and users details. |
Flashpoint.Forum.Tags | Unknown | The displayed list of tags which include ID, name, parent_tag, and UUID. |
Flashpoint.Forum.ForumId | string | The forum’s unique ID. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Forum details#
Below are the details found:Name | Hostname | Tags |
---|---|---|
0hack | bbs.0hack.com | Chinese, Cyber Threat, Hacking, Language |
#
flashpoint-get-forum-room-detailsRetrieves forum room details using the room ID. To retrieve the room ID run the flashpoint-search-forum-posts command and see the value under the Flashpoint.Forum.Post.Room.id context path.
#
Base Commandflashpoint-get-forum-room-details
#
InputArgument Name | Description | Required |
---|---|---|
room_id | The room ID for which to retrieve room information in a forum. To retrieve the room ID run the flashpoint-search-forum-posts command and see the value under the Flashpoint.Forum.Post.Room.id context path. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Forum.Room.Forum | unknown | Forum details, including forum name, hostname, platform url, stats, tags, and so on. |
Flashpoint.Forum.Room.Title | string | The room title. You can use the same title in the forum search command. |
Flashpoint.Forum.Room.Url | string | The forum room URL. |
Flashpoint.Forum.Room.RoomId | string | The forum room ID. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Room details#
Below are the detail found:Forum Name | Title | URL |
---|---|---|
Crdpro | Bank Carding | forumdisplay.php?f=70&s=6e25902255e1b57bfe37dd2749dafd66 |
#
flashpoint-get-forum-user-detailsRetrieves user details using the user-id. To retrieve the user ID, run the flashpoint-search-forum-posts command and see the value under the Flashpoint.Forum.Post.User.id context path.
#
Base Commandflashpoint-get-forum-user-details
#
InputArgument Name | Description | Required |
---|---|---|
user_id | The user ID used to retrieve a user's information. To retrieve the user ID, run the flashpoint-search-forum-posts command and see the value under the Flashpoint.Forum.Post.User.id context path. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Forum.User.Forum | unknown | Forum details, including id, hostname, description, stats, tags, and so on. |
Flashpoint.Forum.User.Name | string | The name of the user. |
Flashpoint.Forum.User.PlatformUrl | string | The platform URL of the user which is redirected to Flashpoint platform. |
Flashpoint.Forum.User.Url | string | The URL of user. |
Flashpoint.Forum.User.UserId | string | The unique ID of the forum user. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint User details#
Below are the detail found:Forum Name | Name | URL |
---|---|---|
Crdpro | IllWillPub | http://www.crdpro.su/member.php?s=9f099a0eebc5f7c79e36fc688af2f697&u=50678 |
#
flashpoint-get-forum-post-detailsRetrieves post details using the post-id. To retrieve the post ID, run the flashpoint-search-forum-posts command and see the value under the Flashpoint.Forum.Post.PostId context path. command or some other investigation.
#
Base Commandflashpoint-get-forum-post-details
#
InputArgument Name | Description | Required |
---|---|---|
post_id | The post ID, which gives post information embedded within the forum, room, user, and so on. To retrieve the post ID, run the flashpoint-search-forum-posts and see the value under the Flashpoint.Forum.Post.PostId context path. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Forum.Post.Forum | unknown | Forum details of the post, including id, hostname, stats, description, tags, and so on. |
Flashpoint.Forum.Post.Room | unknown | Room details of the post, including room title, id, url, platform url, and so on. |
Flashpoint.Forum.Post.User | unknown | User details of the post, including user id, name, url, platform url, and so on. |
Flashpoint.Forum.Post.PlatformUrl | string | Using platform URL user can redirect to Flashpoint platform. |
Flashpoint.Forum.Post.PublishedAt | unknown | The date that the post was published. |
Flashpoint.Forum.Post.Url | unknown | The display URL of the post. |
Flashpoint.Forum.Post.PostId | string | The forum post ID. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Post details#
Below are the detail found:Published at | Forum Name | Room Title | Author Name | Thread Title | URL | Platform url |
---|---|---|---|---|---|---|
2019-12-10T01:17:00+00:00 | Ord-UA | Форум | Дубовик | ДСНС на чолі з Бочковським і К…. | 2014/10/22/dsns-na-choli-z-bochkovskim-i-k/?lpage=1&page=580 | https://fp.tools/home/ddw/forums/threads/M3NorvmYVoG6rVFHnP3T9w?id=PDo1xGiKXDebHGc8fZme6g |
#
flashpoint-search-forum-sitesSearches forum sites using a keyword. it will search in site content like name, title, descripion etc.
#
Base Commandflashpoint-search-forum-sites
#
InputArgument Name | Description | Required |
---|---|---|
site_search | The site keyword or text for which to search. This keyword is used for search information in forum sites. This keyword or text is known by Flashpoint users. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Forum.Site | unknown | A list of forum site details based on the search keyword. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Forum sites related to search: 0hackTop 10 sites:
#
Below are the detail found:Name | Hostname | Description |
---|---|---|
0hack | bbs.0hack.com | 0hack (零黑联盟) is a Chinese-language hacker training forum. The forum appears to be affiliated with 非凡安全网, 803389.com. |
#
flashpoint-search-forum-postsSearch forum posts using a keyword
#
Base Commandflashpoint-search-forum-posts
#
InputArgument Name | Description | Required |
---|---|---|
post_search | The post keyword or text which is used for search information in forum posts, and is known by Flashpoint users. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Forum.Post | unknown | A list of forum posts based on the search keyword. |
#
Command Example#
Context Example#
Human Readable Output#
Flashpoint Forum posts related to search: The Courtyard CaféTop 10 posts:
#
Below are the detail found:Forum Name | Thread Title | Room Title | Author Name | Platform URL |
---|---|---|---|---|
The Sammyboy Times | Fleeting Pleasures… | The Courtyard Café | glockman | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | smoke on the water, fire in th… | The Courtyard Café | syed putra | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | [Singapore] - French girl kena… | The Courtyard Café | laksaboy | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | smoke on the water, fire in th… | The Courtyard Café | laksaboy | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | smoke on the water, fire in th… | The Courtyard Café | Leongsam | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | smoke on the water, fire in th… | The Courtyard Café | rambo22 | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | Fleeting Pleasures… | The Courtyard Café | nightsafari | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | [Singapore] - French girl kena… | The Courtyard Café | nightsafari | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | [Singapore] - French girl kena… | The Courtyard Café | nightsafari | https://fp.tools/home/ddw/foru… |
The Sammyboy Times | HTHT… | The Courtyard Café | Claire | https://fp.tools/home/ddw/foru… |
Follow this link to forum post-search on Flashpoint platform.
#
flashpoint-alert-listRetrieves an alert or a list of alerts based on the filter values provided in the command arguments. Yields the alerts from Flashpoint collected sources and the alerts from data exposure.
#
Base Commandflashpoint-alert-list
#
InputArgument Name | Description | Required |
---|---|---|
since | Filters the alerts based on the earliest date when the alerts were created. Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc. | Optional |
until | Filters the alerts based on the latest date when the alerts were created. Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc. | Optional |
scroll_id | Retrieves the next batch of alerts (scroll_id retrieved in previous alerts response). | Optional |
size | Number of alerts to retrieve in the response. (Maximum allowed size is 100). Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.Alerts.alert_id | String | The ID of the alert. |
Flashpoint.Alerts.fpid | String | The ID of the resource that triggered the alert. |
Flashpoint.Alerts.keyword.keyword_id | String | The ID of the keyword. |
Flashpoint.Alerts.keyword.keyword_text | String | The value of the keyword. |
Flashpoint.Alerts.highlights | Unknown | Snippets of the resource with the keywords highlighted. |
Flashpoint.Alerts.basetypes | Unknown | The data types of the resource. |
Flashpoint.Alerts.ts | Number | The timestamp of when the alert was created. |
Flashpoint.Alerts.tags.archived | Boolean | Whether the alert was archived or not. |
Flashpoint.Alerts.tags.flagged | Boolean | Whether the alert was starred or not. |
Flashpoint.Alerts.source.basetypes | Unknown | The data types of the resource. |
Flashpoint.Alerts.source.body.text/plain | String | The body of the alert in text/plain format. |
Flashpoint.Alerts.source.container.basetypes | Unknown | The data types for the thread or channel in which the content was posted. |
Flashpoint.Alerts.source.container.container.title | String | The title of the container. |
Flashpoint.Alerts.source.container.container.name | String | The name of the container. |
Flashpoint.Alerts.source.container.fpid | String | The ID of the thread or channel in which the content was posted. |
Flashpoint.Alerts.source.container.title | String | The title of the thread or channel in which the content was posted. |
Flashpoint.Alerts.source.created_at.date-time | Date | When the content was originally posted by its author. |
Flashpoint.Alerts.source.created_at.raw | String | When the content was originally posted by its author, as raw format. |
Flashpoint.Alerts.source.created_at.timestamp | Number | When the content was originally posted by its author, as a timestamp. |
Flashpoint.Alerts.source.first_observed_at.date-time | Date | The first time this piece of data was observed by Flashpoint. |
Flashpoint.Alerts.source.first_observed_at.raw | String | The first time this piece of data was observed by Flashpoint, as raw format. |
Flashpoint.Alerts.source.first_observed_at.timestamp | Number | The first time this piece of data was observed by Flashpoint, as a timestamp. |
Flashpoint.Alerts.source.fpid | String | The ID of the resource. |
Flashpoint.Alerts.source.last_observed_at.date-time | Date | The last time this piece of data was observed by Flashpoint. |
Flashpoint.Alerts.source.last_observed_at.raw | String | The last time this piece of data was observed by Flashpoint, as raw format. |
Flashpoint.Alerts.source.last_observed_at.timestamp | Number | The last time this piece of data was observed by Flashpoint, as a timestamp. |
Flashpoint.Alerts.source.native_id | String | The ID used by the original site for the resource. |
Flashpoint.Alerts.source.parent_message._schema | String | The schema of the parent of this resource. |
Flashpoint.Alerts.source.parent_message.basetypes | Unknown | The data types of the parent of this resource. |
Flashpoint.Alerts.source.parent_message.fpid | String | The ID of the parent of this resource. |
Flashpoint.Alerts.source.parent_message.native_id | String | The ID used by the original site for the parent of this resource. |
Flashpoint.Alerts.source.parent_message.type | String | The type of the parent of this resource. |
Flashpoint.Alerts.source.site.title | String | The original site or platform where the resource was published. |
Flashpoint.Alerts.source.site_actor.names.aliases | Unknown | The alias of the user who created the message, authored the blog post, or posted a product for sale. |
Flashpoint.Alerts.source.site_actor.names.handle | String | The handle of the user who created the message, authored the blog post, or posted a product for sale. |
Flashpoint.Alerts.source.sort_date | Date | Sort date of the alert. |
Flashpoint.Alerts.source.title | String | The title of the alert. |
Flashpoint.Alerts.source.file | String | File name for the matched alert. |
Flashpoint.Alerts.source.owner | String | Author of the repo. |
Flashpoint.Alerts.source.repo | String | Repository name. |
Flashpoint.Alerts.source.snippet | String | Small blob of code/text that matched the keyword. |
Flashpoint.Alerts.source.source | String | Code repository platform. |
Flashpoint.Alerts.source.url | String | Link to the alerted source. |
Flashpoint.PageToken.Alert.scroll_id | String | The scroll_id for the next page. |
Flashpoint.PageToken.Alert.size | String | The size for the next page. |
Flashpoint.PageToken.Alert.since | String | The since date for the next page. |
Flashpoint.PageToken.Alert.until | String | The until date for the next page. |
Flashpoint.PageToken.Alert.name | String | The command name. |
#
Command Example!flashpoint-alert-list
#
Context Example#
Human Readable Output#
Alerts from Flashpoint collected sources.FPID | Keyword Text | Site Title | Created Date (UTC) | Last Observed Date (UTC) |
---|---|---|---|---|
dummy_fpid1 | "user manager" | pastebin.com | July 6, 2021 14:44 | July 6, 2021 16:43 |
dummy_fpid2 | "user manager" | pastebin.com | July 6, 2021 10:35 | July 6, 2021 15:55 |
#
Alerts with data exposures.FPID | Keyword Text | File | Owner | Repo | Source |
---|---|---|---|---|---|
dummy_fpid1 | "onelogin" | dummy_file1 | onelogin | dummy_repo1 | github |
dummy_fpid2 | "onelogin" | dummy_file2 | onelogin | dummy_repo2 | github |
To retrieve the next set of result use,
scroll_id = dummy_scroll_id
since = 2021-06-16T02:22:14Z
size = 1
until = 2021-06-16T02:45:00Z
#
flashpoint-compromised-credentials-listRetrieves the compromised credentials based on the filter values provided in the command arguments.
#
Base Commandflashpoint-compromised-credentials-list
#
InputArgument Name | Description | Required |
---|---|---|
start_date | Filters the data based on the start date of the breach (UTC). Note: Will consider current time as default for end_date if start_date is initialized. Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc. | Optional |
end_date | Filters the data based on the end date of the breach (UTC). Note: Requires start_date along with the given argument. Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc. | Optional |
filter_date | Filters the compromised credential's breach data by either created or first observed date. Note: Requires the argument value for at least 'start_date' and 'end_date'. Possible values are: created_at, first_observed_at. | Optional |
page_size | The maximum number of result objects to return per page. Note: The maximum value is 1,000. Default is 50. | Optional |
page_number | Specify a page number to retrieve the compromised credentials. Note: The multiplication of page_size and page_number parameters cannot exceed 10,000. Default is 1. | Optional |
sort_date | Sort the compromised credential's breach data by either created or first observed date. Note: Will consider ascending as default for sort_order if sort_date is initialized. Possible values are: created_at, first_observed_at. | Optional |
sort_order | Specify the order to sort the data in. Note: Requires sort_date along with the given argument. Possible values are: asc, desc. | Optional |
is_fresh | Whether to fetch the fresh compromised credentials or not. Possible values are: true, false. Possible values are: true, false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Flashpoint.CompromisedCredential._id | String | ID of the IoC. |
Flashpoint.CompromisedCredential._source.affected_domain | String | Affected domain of the IoC. |
Flashpoint.CompromisedCredential._source.basetypes | Unknown | The array contains the underlying type of the credentials object, in this case ["credential-sighting"]. |
Flashpoint.CompromisedCredential._source.body.raw | String | This is the raw content captured from the breach Flashpoint discovered. |
Flashpoint.CompromisedCredential._source.breach._header | String | This is the breach header object. |
Flashpoint.CompromisedCredential._source.breach.basetypes | Unknown | Array containing underlying base type of breach object, i.e. ["breach"]. |
Flashpoint.CompromisedCredential._source.breach.breach_type | String | Constant for future use. |
Flashpoint.CompromisedCredential._source.breach.created_at.date-time | Date | Datetime object formatted as YYYY-mm-ddTHH:MM:SSZ. |
Flashpoint.CompromisedCredential._source.breach.created_at.timestamp | Number | UNIX timestamp. |
Flashpoint.CompromisedCredential._source.breach.first_observed_at.date-time | Date | Datetime object formatted as YYYY-mm-ddTHH:MM:SSZ. |
Flashpoint.CompromisedCredential._source.breach.first_observed_at.timestamp | Number | UNIX timestamp. |
Flashpoint.CompromisedCredential._source.breach.fpid | String | Flashpoint ID of the breach. |
Flashpoint.CompromisedCredential._source.breach.source | String | Data source of breach (i.e. Analyst Research, CredentialStealer, etc.). |
Flashpoint.CompromisedCredential._source.breach.source_type | String | Type of source of the breach. |
Flashpoint.CompromisedCredential._source.breach.title | String | Title of breach. |
Flashpoint.CompromisedCredential._source.breach.victim | String | Victim of the breach. |
Flashpoint.CompromisedCredential._source.credential_record_fpid | String | This is the Flashpoint ID of the associated record object. This is used to retrieve sightings for a credential. |
Flashpoint.CompromisedCredential._source.customer_id | String | Customer ID of the IoC. |
Flashpoint.CompromisedCredential._source.domain | String | This is the domain object extracted off of the email address. |
Flashpoint.CompromisedCredential._source.email | String | The email address for the compromised credential. |
Flashpoint.CompromisedCredential._source.extraction_id | String | Extraction ID of the IoC. |
Flashpoint.CompromisedCredential._source.extraction_record_id | String | Extraction record ID of the IoC. |
Flashpoint.CompromisedCredential._source.fpid | String | The Flashpoint ID of this credentials object. |
Flashpoint.CompromisedCredential.source.header.indexed_at | String | Timestamp for when this document was indexed into the Flashpoint database. |
Flashpoint.CompromisedCredential.source.header.pipeline_duration | String | Pipeline duration header information of the IoC. |
Flashpoint.CompromisedCredential._source.is_fresh | Boolean | This will be "true" if the credential has not been seen before, and it hasn't been marked "not fresh" by an analyst. (Historical breaches are not "fresh".). |
Flashpoint.CompromisedCredential._source.last_observed_at.date-time | Date | If exists, time object for when the credential was previously observed. Datetime object formatted as YYYY-mm-ddTHH:MM:SSZ. |
Flashpoint.CompromisedCredential._source.last_observed_at.timestamp | Number | UNIX timestamp. |
Flashpoint.CompromisedCredential._source.password | String | The password for the credential (in plain text, if possible). |
Flashpoint.CompromisedCredential._source.password_complexity.has_lowercase | Boolean | Boolean true/false if lowercase letters are present. |
Flashpoint.CompromisedCredential._source.password_complexity.has_number | Boolean | Boolean true/false if numbers are present. |
Flashpoint.CompromisedCredential._source.password_complexity.has_symbol | Boolean | Boolean true/false if symbols are present. |
Flashpoint.CompromisedCredential._source.password_complexity.has_uppercase | Boolean | Boolean true/false if uppercase letters are present. |
Flashpoint.CompromisedCredential._source.password_complexity.length | Number | Integer value that represents number of characters in password. |
Flashpoint.CompromisedCredential._source.password_complexity.probable_hash_algorithms | Unknown | List of possible hash algorithms suspected based on textpattern of the password (May include values like "MD5", "SHA-1", "SHA-256", "bcrypt", etc.) |
Flashpoint.CompromisedCredential._source.times_seen | Number | Integer representing the number of times the credential has been seen at Flashpoint. |
Flashpoint.CompromisedCredential._type | String | Type of the IoC. |
Flashpoint.CompromisedCredential.matched_queries | Unknown | Matching queries of the IoC. |
Flashpoint.CompromisedCredential.sort | Unknown | Sort value of the IoC. |
#
Command Example!flashpoint-compromised-credentials-list
#
Context Example#
Human Readable Output#
Total number of records found: 1302#
Compromised Credential(s)FPID | Breach Source | Breach Source Type | Password | Created Date (UTC) | First Observed Date (UTC) | |
---|---|---|---|---|---|---|
dummy_fpid1 | dummy_email1 | Analyst Research | Analyst Research | dummy_password1 | Jan 26, 2021 12:00 | Jan 27, 2021 18:50 |
dummy_fpid2 | dummy_email2 | https://www.virustotal.com/gui/file/0e59531d9ebf1d695cb41c1afd443c22bfaef56dafa636c2cf157deb19b679fe/details | VirusTotal | dummy_password2 | Jun 6, 2021 20:47 | Jun 6, 2021 20:47 |