Skip to main content

Flashpoint Feed

This Integration is part of the FlashpointFeed Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

Flashpoint Feed Integration allows importing indicators of compromise that occur in the context of an event on the Flashpoint platform which contains finished intelligence reports data, data from illicit forums, marketplaces, chat services, blogs, paste sites, technical data, card shops, and vulnerabilities. The indicators of compromise are ingested as indicators on the Cortex XSOAR and displayed in the War Room using a command. This integration was integrated and tested with version 4.0.0 of FlashpointFeed

Fetch Indicators#

Fetching the Flashpoint indicators. The indicators that are created or updated after the provided first fetch time interval will be fetched in the ascending order.

Configure FlashpointFeed on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for FlashpointFeed.

  3. Click Add instance to create and configure a new integration instance.

    Server URLServer URL to connect to Flashpoint.True
    API KeyTrue
    Types of the indicators to fetchSupports multiple values such as url, domain, ip-src. Supports comma separated values. If not specified, it fetches all the indicators. See all available types:
    First fetch time intervalBackfill indicators by providing date or relative timestamp. (Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc)False
    Fetch indicatorsFalse
    Indicator ReputationIndicators from this integration instance will be marked with this reputationFalse
    Source ReliabilityReliability of the source providing the intelligence dataTrue
    Feed Fetch IntervalFalse
    Bypass exclusion listWhen selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.False
    TagsSupports CSV values.False
    Traffic Light Protocol ColorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feedFalse
    feedIncrementalTo indicate to the Cortex XSOAR server that a feed is incremental. Generally feeds that fetch based on a time range. For example, a daily feed which provides new indicators for the last day or a feed which is immutable and provides indicators from a search date onwards.False
    Create relationshipsCreate relationships between indicators as part of Enrichment.False
    Default Indicator MappingWhen selected, all the incoming indicators will map to the Flashpoint Indicator.False
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
  4. Click Test to validate the URLs, token, and connection.


You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.


Retrieves indicators from the Flashpoint API. It displays the content of the fetch-indicators command.

Base Command#



Argument NameDescriptionRequired
limitThe maximum number of result objects to return. Maximum allowed limit is 1000. Default is 10.Optional
updated_sinceOnly retrieve values after the given timestamp. This parameter operates on the timestamp when an IOC was last updated, i.e. enriched with more metadata. When you want the most recent IOCs shared in the past week, the freshest data, we recommend using this parameter. Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc. Default is 3 days.Optional
typesSearch by Attribute types. Can have multiple terms. Example: url, domain, ip-src. See all available types:

Context Output#

There is no context output for this command.

Command Example#

!flashpoint-get-indicators limit=10 types=url updated_since="3 days"

Human Readable Output#


FPIDIndicator TypeIndicator ValueCategoryEvent NameEvent TagsCreated Timestamp (UTC)First Observed Date
dummy_fpid1url deliveryAnalysis: dummy_event1 "dummy_value1" [2021-07-06 20:11:11]analysis_id:12345,
misp-galaxy:mitre-enterprise-attack-attack-pattern="Software Packing - T1045",
dummy_fpid2url deliveryAnalysis: dummy_event1 "dummy_value2" [2021-07-06 21:17:56]analysis_id:56789,
misp-galaxy:mitre-enterprise-attack-attack-pattern="Code Signing - T1116",
misp-galaxy:mitre-enterprise-attack-attack-pattern="Disabling Security Tools - T1089",
misp-galaxy:mitre-enterprise-attack-attack-pattern="Registry Run Keys / Start Folder - T1060",
misp-galaxy:mitre-enterprise-attack-attack-pattern="Software Packing - T1045",
misp-galaxy:mitre-enterprise-attack-attack-pattern="Timestomp - T1099",
misp-galaxy:mitre-enterprise-attack-course-of-action="Process Injection Mitigation - T1055",
misp-galaxy:mitre-mobile-attack-attack-pattern="Lockscreen Bypass - MOB-T1064",