Flashpoint Ignite
Flashpoint Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.10.0 and later.
Use the Flashpoint Ignite integration to reduce business risk. Ignite allows users to ingest alerts and compromised credentials as incident alerts and executes commands such as search intelligence report, ip, url, get events, and more. This integration was integrated and tested with API v1 of Ignite.
#
Auto Extract IndicatorBoth incident types Ignite Alert and Flashpoint Compromised Credentials support the auto extraction feature by default. This feature extracts indicators and enriches their reputations using commands and scripts defined for the indicator type (Refer to Indicator extraction (Cortex XSOAR 6.13) or Indicator extraction (Cortex XSOAR 8 Cloud) or Indicator extraction (Cortex XSOAR 8.7 On-prem) for more details).
If you are upgrading from a Flashpoint integration, please refer to the Migration Guide for guidance.
#
Configure Flashpoint Ignite on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Flashpoint Ignite.
Click Add instance to create and configure a new integration instance.
To fetch Ignite alerts, refer to the section "Configuration for fetching Ignite Alerts as a Cortex XSOAR Incident".
To fetch Ignite compromised credentials, refer to the section "Configuration for fetching Ignite Compromised Credentials as a Cortex XSOAR Incident".
Parameter Description Required Fetch incidents False Incident type False Server URL Server URL to connect to Ignite. True API Key API key used for secure communication with the Ignite platform. True Maximum number of incidents per fetch The maximum limit is 200 for alerts and compromised credentials. False First fetch time Date or relative timestamp to start fetching the incidents from. (Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc.). False Fetch Type Whether to fetch the Ignite alerts or the compromised credentials. Defaults to "Compromised Credentials" if nothing selected. False Severity for Incidents Set the default severity for the incidents using this instance. False Alert Status Filters the incoming alerts with the provided alert status. False Alert Origin Filters the incoming alerts with the origin of the alert. False Alert Sources Filters the incoming alerts with the source of the alert. False Fetch fresh compromised credentials alerts Adds the 'is_fresh' flag to compromised credential queries so it only ingests username/password combinations if they haven't been seen before. False Fetch compromised credentials alerts having lowercase in password Filters the incoming compromised credentials alerts with passwords having lowercase letters. False Fetch compromised credentials alerts having uppercase in password Filters the incoming compromised credentials alerts with passwords having uppercase letters. False Fetch compromised credentials alerts having numbers in password Filters the incoming compromised credentials alerts with passwords having numbers. False Fetch compromised credentials alerts having symbol in password Filters the incoming compromised credentials alerts with passwords having symbols. False Fetch compromised credentials alerts having minimum length of password Filters the incoming compromised credentials alerts with passwords has minimum length. False Source Reliability Reliability of the source providing the intelligence data. False Create relationships Create relationships between indicators as part of enrichment. False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
Configuration for fetching Ignite Alerts as a Cortex XSOAR Incident- Select Fetches incidents.
- Under Classifier, select "N/A".
- Under Incident type, select "Ignite Alert".
- Under Mapper (incoming), select "Ignite Alert - Incoming Mapper" for default mapping.
- Enter the connection parameters (Server URL, API key).
- Under the Fetch Type, select "Alerts".
- Select "Alert Status" based on your requirement to filter the alerts. By default, it will fetch all status of alerts.
- Select "Alert Origin" based on your requirement to filter the alerts. By default, it will fetch all origins of alerts.
- Select "Alert Sources" based on your requirement to filter the alerts. By default, it will fetch all sources of alerts.
- Select "Severity for Incidents" based on your requirement to set the default severity for the incidents. By default, it will set the Unknown severity for all incidents.
- Update "First fetch time" and "Max Fetch Count" based on your requirements.
#
Configuration for fetching Ignite Compromised Credentials as a Cortex XSOAR Incident- Select Fetches incidents.
- Under Classifier, select "N/A".
- Under Incident type, select "Flashpoint Compromised Credentials".
- Under Mapper (incoming), select "Flashpoint Compromised Credentials - Incoming Mapper" for default mapping.
- Enter the connection parameters (Server URL, API key).
- Under the Fetch Type, select "Compromised Credentials".
- Select "Fetch fresh compromised credentials alerts" so that it only ingests username/password combinations if they haven't been seen before.
- Select "Fetch compromised credentials alerts having lowercase in password" so that it filters the incoming compromised credentials alerts with passwords having lowercase letters.
- Select "Fetch compromised credentials alerts having uppercase in password" so that it filters the incoming compromised credentials alerts with passwords having uppercase letters.
- Select "Fetch compromised credentials alerts having numbers in password" so that it filters the incoming compromised credentials alerts with passwords having numbers.
- Select "Fetch compromised credentials alerts having symbol in password" so that it filters the incoming compromised credentials alerts with passwords having symbols.
- Select "Fetch compromised credentials alerts having minimum length of password" so that it filters the incoming compromised credentials alerts with passwords has minimum length.
- Update "First fetch time" and "Max Fetch Count" based on your requirements.
#
Troubleshooting#
Error: The maximum records to fetch for the given first fetch can not exceed 10,000- The maximum number of records that can be fetched using the first fetch time is limited to 10,000 by the API.
- To resolve this issue, you can reduce the first fetch time to a shorter time period, ensuring that the total number of records fetched during the specified time falls within the 10,000 limit.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
flashpoint-ignite-intelligence-report-searchSearch for the Intelligence Reports using a keyword.
#
Base Commandflashpoint-ignite-intelligence-report-search
#
InputArgument Name | Description | Required |
---|---|---|
report_search | Search report using keyword or text. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Ignite.Report.NotifiedAt | string | Notify date of report. |
Ignite.Report.PlatformUrl | string | Platform URL of the report. Used to help redirect the Ignite platform. |
Ignite.Report.PostedAt | number | Posted date of the report. |
Ignite.Report.Summary | string | Summary of the report. |
Ignite.Report.Title | string | Title of the report. |
Ignite.Report.UpdatedAt | string | Last updated date of the report. |
Ignite.Report.ReportId | string | Unique ID of the report. |
#
Command example!flashpoint-ignite-intelligence-report-search report_search=ChatGpt
#
Context Example#
Human Readable Output#
Ignite Intelligence reports related to search: ChatGptTop 5 reports: 1) Artificial Intelligence Threat Landscape Summary: This report covers evolving events that impact the advancement of AI technology and highlights notable developments that impact safety for users and organizations.
Link to Report-search on Ignite platform: https://app.flashpoint.io/cti/intelligence/search?query=ChatGpt
#
flashpoint-ignite-compromised-credentials-listRetrieves the compromised credentials based on the filter values provided in the command arguments.
#
Base Commandflashpoint-ignite-compromised-credentials-list
#
InputArgument Name | Description | Required |
---|---|---|
start_date | Filters the data based on the start date of the breach (UTC). Note: Will consider current time as default for end_date if start_date is initialized. Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc. | Optional |
end_date | Filters the data based on the end date of the breach (UTC). Note: Requires start_date along with the given argument. Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc. | Optional |
filter_date | Filters the compromised credential's breach data by either created or first observed date. Note: Requires the argument value for at least 'start_date' and 'end_date'. Possible values are: created_at, first_observed_at. | Optional |
page_size | The maximum number of result objects to return per page. Note: The maximum value is 1,000. Default is 50. | Optional |
page_number | Specify a page number to retrieve the compromised credentials. Note: The multiplication of page_size and page_number parameters cannot exceed 10,000. Default is 1. | Optional |
sort_date | Sort the compromised credential's breach data by either created or first observed date. Note: Will consider ascending as default for sort_order if sort_date is initialized. Possible values are: created_at, first_observed_at. | Optional |
sort_order | Specify the order to sort the data in. Note: Requires sort_date along with the given argument. Possible values are: asc, desc. | Optional |
is_fresh | Whether to fetch the fresh compromised credentials or not. Possible values are: true, false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Ignite.CompromisedCredential._id | String | ID of the IoC. |
Ignite.CompromisedCredential._source.affected_domain | String | Affected domain of the IoC. |
Ignite.CompromisedCredential._source.basetypes | Unknown | The array contains the underlying type of the credentials object, in this case ["credential-sighting"]. |
Ignite.CompromisedCredential._source.body.raw | String | This is the raw content captured from the breach Flashpoint discovered. |
Ignite.CompromisedCredential._source.breach._header | String | This is the breach header object. |
Ignite.CompromisedCredential._source.breach.basetypes | Unknown | Array containing the underlying base type of the breach object, i.e., ["breach"]. |
Ignite.CompromisedCredential._source.breach.breach_type | String | Constant for future use. |
Ignite.CompromisedCredential._source.breach.created_at.date-time | Date | The datetime when the source breach was created, formatted as YYYY-mm-ddTHH:MM:SSZ. |
Ignite.CompromisedCredential._source.breach.created_at.timestamp | Number | The UNIX timestamp when the source breach was created. |
Ignite.CompromisedCredential._source.breach.first_observed_at.date-time | Date | Datetime when the source breach was first observed, formatted as YYYY-mm-ddTHH:MM:SSZ. |
Ignite.CompromisedCredential._source.breach.first_observed_at.timestamp | Number | The UNIX timestamp when the source breach was first observed. |
Ignite.CompromisedCredential._source.breach.fpid | String | Flashpoint ID of the breach. |
Ignite.CompromisedCredential._source.breach.source | String | Data source of breach (i.e., Analyst Research, CredentialStealer, etc.). |
Ignite.CompromisedCredential._source.breach.source_type | String | Type of source of the breach. |
Ignite.CompromisedCredential._source.breach.title | String | Title of the breach. |
Ignite.CompromisedCredential._source.breach.victim | String | Victim of the breach. |
Ignite.CompromisedCredential._source.credential_record_fpid | String | The Flashpoint ID of the associated record object. Used to retrieve sightings for a credential. |
Ignite.CompromisedCredential._source.customer_id | String | Customer ID of the IoC. |
Ignite.CompromisedCredential._source.domain | String | The domain object extracted off of the email address. |
Ignite.CompromisedCredential._source.email | String | The email address for the compromised credential. |
Ignite.CompromisedCredential._source.username | String | The username for the compromised credential. |
Ignite.CompromisedCredential._source.extraction_id | String | Extraction ID of the IoC. |
Ignite.CompromisedCredential._source.extraction_record_id | String | Extraction record ID of the IoC. |
Ignite.CompromisedCredential._source.fpid | String | The Flashpoint ID of this credentials object. |
Ignite.CompromisedCredential.source.header.indexed_at | String | Timestamp for when this document was indexed into the Flashpoint database. |
Ignite.CompromisedCredential.source.header.pipeline_duration | String | Pipeline duration header information of the IoC. |
Ignite.CompromisedCredential._source.is_fresh | Boolean | "true" if the credential has not been seen before, and it hasn't been marked "not fresh" by an analyst. (Historical breaches are not "fresh".). |
Ignite.CompromisedCredential._source.last_observed_at.date-time | Date | If exists, time object for when the credential was previously observed. Datetime object formatted as YYYY-mm-ddTHH:MM:SSZ. |
Ignite.CompromisedCredential._source.last_observed_at.timestamp | Number | The UNIX timestamp when the source breach was first observed. |
Ignite.CompromisedCredential._source.password | String | The password for the credential (in plain text, if possible). |
Ignite.CompromisedCredential._source.password_complexity.has_lowercase | Boolean | Whether lowercase letters are present. |
Ignite.CompromisedCredential._source.password_complexity.has_number | Boolean | Whether numbers are present. |
Ignite.CompromisedCredential._source.password_complexity.has_symbol | Boolean | Whether symbols are present. |
Ignite.CompromisedCredential._source.password_complexity.has_uppercase | Boolean | Whether uppercase letters are present. |
Ignite.CompromisedCredential._source.password_complexity.length | Number | Integer value that represents the number of characters in the password. |
Ignite.CompromisedCredential._source.password_complexity.probable_hash_algorithms | Unknown | List of possible hash algorithms suspected based on the text pattern of the password. (May include values like "MD5", "SHA-1", "SHA-256", "bcrypt", etc.) |
Ignite.CompromisedCredential._source.times_seen | Number | Integer representing the number of times the credential has been seen at Flashpoint. |
Ignite.CompromisedCredential._type | String | Type of the IoC. |
Ignite.CompromisedCredential.matched_queries | Unknown | Matching queries of the IoC. |
Ignite.CompromisedCredential.sort | Unknown | Sort value of the IoC. |
#
Command example!flashpoint-ignite-compromised-credentials-list start_date="2 weeks" end_date="1 days" filter_date=created_at is_fresh=true page_number=2 page_size=1 sort_date=created_at sort_order=asc
#
Context Example#
Human Readable Output#
Total number of records found: 150#
Compromised Credential(s)
FPID Username Breach Source Breach Source Type Password Created Date (UTC) First Observed Date (UTC) sample_fpid someone@example.com someone@example.com Analyst Research Credential Stealer pass_123 May 10, 2024 16:13 May 10, 2024 16:13
#
flashpoint-ignite-event-listSearches for events within the specified time period, the Flashpoint report ID, or attack IDs.
#
Base Commandflashpoint-ignite-event-list
#
InputArgument Name | Description | Required |
---|---|---|
time_period | The time period for the search. | Optional |
report_fpid | The Flashpoint report ID. To retrieve the Flashpoint report ID, run the flashpoint-ignite-intelligence-related-report-list command. | Optional |
limit | The maximum number of records. Default is 10. | Optional |
attack_ids | A comma-separated list of attack IDs for which to search. Attack IDs can be found in event information or on the Ignite platform by filtering events by attack IDs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Ignite.Event.EventCreatorEmail | string | The email of the event creator. |
Ignite.Event.EventId | string | The ID of the event. |
Ignite.Event.UUID | string | The UUID of the event. |
Ignite.Event.Href | string | The hyperlink of the event. |
Ignite.Event.MalwareDescription | string | The description of the malware. |
Ignite.Event.Name | string | The name of the event. |
Ignite.Event.ObservedTime | string | The date that the event was triggered. |
Ignite.Event.Tags | string | The tags of the event. |
#
Command example!flashpoint-ignite-event-list limit="2" attack_ids=T1001
#
Context Example#
Human Readable Output#
Ignite Events#
Below are the detail found:
Observed time (UTC) Name Tags Malware Description May 31, 2024 04:03 Observation: strike "0000000000000000000000000000000000000000000000000000000000000001" [2024-05-31 03:49:12] mitre:T1001 This malicious adoption has caused difficulties in determining whether observed activity is related to an ongoing criminal attack. May 31, 2024 01:00 Observation: strike "0000000000000000000000000000000000000000000000000000000000000002" [2024-05-31 00:01:14] mitre:T1001 Strike became popular among threat actors as an initial access payload, as well as a second-stage tool threat actors use once access is achieved. All events and details (ignite): https://mock_dummy.com/cti/malware/iocs
#
flashpoint-ignite-event-getRetrieves the details of a single event using event FPID or UUID.
#
Base Commandflashpoint-ignite-event-get
#
InputArgument Name | Description | Required |
---|---|---|
event_id | The FPID or UUID that identifies a particular event. The event ID can be fetched from the output context path (Ignite.Event.EventId) of the flashpoint-ignite-event-list command, or the indicator reputation command response or some other investigation. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Ignite.Event.EventCreatorEmail | string | The email of the event creator. |
Ignite.Event.EventId | string | The ID of the event. |
Ignite.Event.UUID | string | The UUID of the event. |
Ignite.Event.Href | string | The hyperlink of the event. |
Ignite.Event.MalwareDescription | string | The description of the malware. |
Ignite.Event.Name | string | The name of the event. |
Ignite.Event.ObservedTime | string | The date that the event was triggered. |
Ignite.Event.Tags | string | The tags of the event. |
#
Command example!flashpoint-ignite-event-get event_id=0000000000000000000001
#
Context Example#
Human Readable Output#
Ignite Event details#
Below are the detail found:
Observed time (UTC) Name Tags Malware Description May 31, 2024 04:03 Observation: strike "0000000000000000000000000000000000000000000000000000000000000001" [2024-05-31 03:49:12] mitre:T1001 This malicious adoption has caused difficulties in determining whether observed activity is related to an ongoing criminal attack.
#
flashpoint-ignite-intelligence-report-getGet single report details using the report id.
#
Base Commandflashpoint-ignite-intelligence-report-get
#
InputArgument Name | Description | Required |
---|---|---|
report_id | The ID of the report for which the details are to be fetched. The report ID can be retrieved from the output context path (Ignite.Report.ReportId) of the flashpoint-ignite-intelligence-report-search command or some other investigation. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Ignite.Report.NotifiedAt | string | Notify date of the report. |
Ignite.Report.PlatformUrl | string | Platform URL of the report. Used to help redirect the Ignite platform. |
Ignite.Report.PostedAt | number | Posted date of the report. |
Ignite.Report.Summary | string | Summary of the report. |
Ignite.Report.Title | string | Title of the report. |
Ignite.Report.UpdatedAt | string | Last updated date of the report. |
Ignite.Report.ReportId | string | Unique ID of the report. |
Ignite.Report.Tags | string | Tags of the report. |
#
Command example!flashpoint-ignite-intelligence-report-get report_id=00000000000000000001
#
Context Example#
Human Readable Output#
Ignite Intelligence Report details#
Below are the details found:
Title Date Published (UTC) Summary Tags Key Developments: XYZ (February 3-10, 2022) Feb 10, 2022 22:25 A weekly update on major developments in XYZ. Energy, Government & Policymakers, XYZ, Law Enforcement & Military, Intelligence Report, Technology & Internet, Right-Wing Extremist, Media & Telecom, Protests, Cyber Threats, Physical Threats, Government, Technology, Right-wing extremism, Media, Direct action and protests, Key Developments: XYZ
#
flashpoint-ignite-intelligence-related-report-listList related reports for a particular report using the report ID.
#
Base Commandflashpoint-ignite-intelligence-related-report-list
#
InputArgument Name | Description | Required |
---|---|---|
report_id | The report-id of the report of which the related reports are to be fetched. The report id can be known from output context path (Ignite.Report.ReportId) of flashpoint-ignite-intelligence-report-search command or some other investigation. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Ignite.Report.NotifiedAt | string | Notify date of report. |
Ignite.Report.PlatformUrl | string | Platform URL of the report. Used to help redirect the Ignite platform. |
Ignite.Report.PostedAt | number | Posted date of the report. |
Ignite.Report.Summary | string | Summary of the report. |
Ignite.Report.Title | string | Title of the report. |
Ignite.Report.UpdatedAt | string | Last updated date of the report. |
Ignite.Report.ReportId | string | Unique ID of the report. |
#
Command example!flashpoint-ignite-intelligence-related-report-list report_id=00000000000000000003
#
Context Example#
Human Readable Output#
Ignite Intelligence related reports:Top 5 related reports:
1) Key Developments: XYZ (April 7-13, 2023) Summary: A weekly report on the major developments in XYZ.
Link to the given Report on Ignite platform: https://app.flashpoint.io/cti/intelligence/report/00000000000000000001#detail
#
flashpoint-ignite-alert-listRetrieves a list of alerts based on the filter values provided in the command arguments.
#
Base Commandflashpoint-ignite-alert-list
#
InputArgument Name | Description | Required |
---|---|---|
size | The number of alerts to return. Default is 10. | Optional |
created_after | Returns alerts that occurred after the specified date. (Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc). | Optional |
created_before | Returns alerts that occurred before the specified date. (Formats accepted: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ, etc). | Optional |
cursor | The cursor to retrieve next page data. Used for pagination only. The value of the cursor can be found from the output context path (Ignite.PageToken.Alert.cursor) or the HR output of the flashpoint-ignite-alert-list command. | Optional |
status | Filter alerts by status. Possible values are: Archived, Starred, Sent, None. | Optional |
origin | Filter alerts by origin. Possible values are: Searches, Assets. | Optional |
sources | Filter alerts by source. Possible values are: Github, Gitlab, Bitbucket, Communities, Images, Marketplaces. | Optional |
tags | A comma-separated list of alerts filtered by tags. | Optional |
asset_type | Filter alerts by asset type. | Optional |
asset_ip | Filter alerts by asset IP. | Optional |
asset_ids | A comma-separated list of alerts filtered by asset IDs. | Optional |
query_ids | A comma-separated list of alerts filtered by search IDs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Ignite.Alert.id | String | The unique identifier for the alert. |
Ignite.Alert.resource.id | String | The identifier for the resource associated with the alert. |
Ignite.Alert.resource.basetypes | String | Base types of the resource related to the alert. |
Ignite.Alert.resource.container.container.name | String | The name of the nested container within the resource that holds the alert. |
Ignite.Alert.resource.container.container.native_id | String | The native identifier for the nested container within the resource. |
Ignite.Alert.resource.container.container.title | String | The title of the nested container within the resource. |
Ignite.Alert.resource.container.name | String | The name of the container that holds the resource associated with the alert. |
Ignite.Alert.resource.container.native_id | String | The native identifier for the container that holds the resource. |
Ignite.Alert.resource.container.title | String | The title of the container that holds the resource associated with the alert. |
Ignite.Alert.resource.created_at.date-time | String | The date and time when the resource associated with the alert was created in ISO 8601 format. |
Ignite.Alert.resource.created_at.raw | Date | The raw timestamp or other date-time representation when the resource was created. |
Ignite.Alert.resource.created_at.timestamp | Number | The UNIX timestamp representing when the resource associated with the alert was created. |
Ignite.Alert.resource.media_v2.sha1 | String | The SHA1 hash of the media file related to the alert. |
Ignite.Alert.resource.media_v2.phash | String | The perceptual hash (pHash) of the media file, used to find visually similar images. |
Ignite.Alert.resource.media_v2.media_type | String | The type of media (e.g., image, video) associated with the alert. |
Ignite.Alert.resource.media_v2.mime_type | String | The MIME type of the media file associated with the alert. |
Ignite.Alert.resource.media_v2.storage_uri | String | The storage URI where the media file related to the alert is located. |
Ignite.Alert.resource.media_v2.image_enrichment.enrichments.v1.image-analysis.safe_search.racy | Number | A score indicating the likelihood that the image contains racy content. |
Ignite.Alert.resource.media_v2.image_enrichment.enrichments.v1.image-analysis.safe_search.spoof | Number | A score indicating the likelihood that the image contains spoofed content. |
Ignite.Alert.resource.media_v2.image_enrichment.enrichments.v1.image-analysis.safe_search.medical | Number | A score indicating the likelihood that the image contains medical content. |
Ignite.Alert.resource.media_v2.image_enrichment.enrichments.v1.image-analysis.safe_search.adult | Number | A score indicating the likelihood that the image contains sexual content. |
Ignite.Alert.resource.media_v2.image_enrichment.enrichments.v1.image-analysis.safe_search.adult | Number | A score indicating the likelihood that the image contains adult content. |
Ignite.Alert.resource.media_v2.image_enrichment.enrichments.v1.image-analysis.safe_search.violence | Number | A score indicating the likelihood that the image contains violent content. |
Ignite.Alert.resource.title | String | The title of the resource associated with the alert. |
Ignite.Alert.resource.section | String | The section of the platform or service where the resource is categorized or located. |
Ignite.Alert.resource.repo | String | Repository of the resource related to the alert. |
Ignite.Alert.resource.snippet | String | Snippet of the resource related to the alert. |
Ignite.Alert.resource.source | String | Source of the resource related to the alert. |
Ignite.Alert.resource.url | String | URL of the resource related to the alert. |
Ignite.Alert.resource.owner | String | Owner of the resource related to the alert. |
Ignite.Alert.resource.file | String | File associated with the resource related to the alert. |
Ignite.Alert.resource.parent_basetypes | String | The parent base types that categorize the resource. |
Ignite.Alert.resource.site_actor.names.handle | String | The username or handle of the site actor related to the resource. |
Ignite.Alert.resource.site_actor.native_id | String | The native identifier for the site actor associated with the resource. |
Ignite.Alert.resource.sort_date | Date | The date and time used for sorting the resource, typically the creation or publication date. |
Ignite.Alert.resource.site.title | String | The title of the site or platform associated with the resource. |
Ignite.Alert.resource.shodan_host.asn | String | The ASN (Autonomous System Number) of the Shodan host. |
Ignite.Alert.resource.shodan_host.country | String | The country of the Shodan host. |
Ignite.Alert.resource.shodan_host.org | String | The organization of the Shodan host. |
Ignite.Alert.resource.shodan_host.shodan_url | String | The Shodan URL of the Shodan host. |
Ignite.Alert.resource.shodan_host.vulns | Unknown | The vulnerabilities related to the Shodan host. |
Ignite.Alert.reason.id | String | ID of the reason for the alert. |
Ignite.Alert.reason.name | String | Name of the reason for the alert. |
Ignite.Alert.reason.text | String | Text related to the reason for the alert. |
Ignite.Alert.reason.origin | String | Origin of the reason for the alert. |
Ignite.Alert.reason.details.sources | String | Sources related to the reason for the alert. |
Ignite.Alert.reason.details.params | Unknown | Parameters related to the reason for the alert. |
Ignite.Alert.reason.details.params.include.date.end | String | The end date for the included date range in the alert's reason details. |
Ignite.Alert.reason.details.params.include.date.label | String | The label describing the included date range in the alert's reason details. |
Ignite.Alert.reason.details.params.include.date.start | String | The start date for the included date range in the alert's reason details. |
Ignite.Alert.reason.details.type | String | The type of details related to the reason for the alert. |
Ignite.Alert.reason.entity.id | String | ID of the entity related to the reason for the alert. |
Ignite.Alert.reason.entity.name | String | Name of the entity related to the reason for the alert. |
Ignite.Alert.reason.entity.type | String | Type of the entity related to the reason for the alert. |
Ignite.Alert.status | String | Status of the alert. |
Ignite.Alert.generated_at | Date | Date when the alert was generated. |
Ignite.Alert.created_at | Date | Date when the alert was created. |
Ignite.Alert.tags | Unknown | Tags associated with the alert. |
Ignite.Alert.highlights.media_v2.image_enrichment.enrichments.v1.image-analysis.text.value | String | The text value extracted from the image analysis in the alert's highlights. |
Ignite.Alert.highlights.ports | String | The highlighted ports related to the alert. |
Ignite.Alert.highlights.services | String | The highlighted services related to the alert. |
Ignite.Alert.highlight_text | String | The highlighted text associated with the alert. |
Ignite.Alert.data_type | String | Data type of the alert. |
Ignite.Alert.parent_data_type | String | Parent data type of the alert. |
Ignite.Alert.source | String | Source of the alert. |
Ignite.Alert.is_read | Boolean | Indicates if the alert has been read. |
Ignite.Alert.highlights.body.text/plain | String | The plain text extracted from the body of the content highlighted in the alert. |
Ignite.Alert.reason.details.params.include.ships_from | String | The shipping origin included in the alert's reason details. |
Ignite.Alert.highlights.snippet | String | A snippet or excerpt highlighted in the alert. |
Ignite.PageToken.Alert.created_after | Date | Date for filtering alerts created after a specific time. |
Ignite.PageToken.Alert.created_before | Date | Date for filtering alerts created before a specific time. |
Ignite.PageToken.Alert.size | String | Size of the page for pagination. |
Ignite.PageToken.Alert.cursor | Date | Cursor for pagination to retrieve the next set of alerts. |
Ignite.PageToken.Alert.name | String | The name of the command. |
#
Command example!flashpoint-ignite-alert-list created_after="2024-06-11T05:54:25Z" created_before="2024-06-12T05:54:27Z" size=1
#
Context Example#
Human Readable Output#
Alerts
ID Created at (UTC) Query Source Resource URL Site Title Shodan Host Repository Owner Origin Ports Services Highlight Text 00000000-0000-0000-0000-000000000001 Jun 17, 2024 05:54 data_exposure__github https://dummyurl.com/naive-gabrie-white naive-gabrie-white.github.io naive-gabrie-white searches data-image="https://i.dummyurl.net/2021/02/24/000000000000001.png" data-sites="<x-fp-highlight>facebook</x-fp-highlight>,twitter,wechat,weibo,qq"><link rel="stylesheet" href="https:...> 00000000-0000-0000-0000-000000000005 Jul 02, 2024 16:43 0.0.0.1 asn: AS0001
country: United States
org: Company LLC
shodan_url: https://www.shodan.io/host/0.0.0.1assets 53, 443 Unknown Service (Port 01), Unknown Service (Port 02) <x-fp-highlight>53</x-fp-highlight> #
To retrieve the next set of result use,created_after = 2024-06-14T05:54:25Z created_before = 2024-06-17T05:54:25Z size = 1 cursor = 1718603662.158905
#
emailLooks up the "Email" type indicator details. The reputation of Email is considered malicious if there's at least one IoC event in the Ignite database matching the Email indicator.
#
Base Commandemail
#
InputArgument Name | Description | Required |
---|---|---|
A comma-separated list of emails. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Ignite.Email.Event.Href | string | A list of reference links of the indicator. |
Ignite.Email.Event.EventDetails | string | The event details in which the indicator was observed. |
Ignite.Email.Event.Category | string | The category of the indicator. |
Ignite.Email.Event.Fpid | string | The Flashpoint ID of the indicator. |
Ignite.Email.Event.Timestamp | string | The time and date that the indicator was observed. |
Ignite.Email.Event.Type | string | The indicator type. |
Ignite.Email.Event.Uuid | string | The UUID of the indicator. |
Ignite.Email.Event.Comment | string | The comment that was provided when the indicator was observed. |
Account.Description | string | The description of the indicator. |
Account.Email.Name | string | Name of indicator. |
#
Command Example#
Context Example#
Human Readable Outputdummy@dummy.com#
Ignite Email reputation forReputation: Malicious
#
Events in which this IOC observed
Date Observed (UTC) Name Tags Jan 01, 1970 00:00 sample info sample_tags All events and details (ignite): https://mock_dummy.com/cti/malware/iocs?sort_date=All%20Time&types=email-dst,email-src,email-src-display-name,email-subject,email&query=%22dummy%40dummy.com%22
#
filenameLooks up the "Filename" type indicator details. The reputation of Filename is considered malicious if there's at least one IoC event in the Ignite database matching the Filename indicator.
#
Base Commandfilename
#
InputArgument Name | Description | Required |
---|---|---|
filename | A comma-separated list of filenames. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Ignite.Filename.Event.Href | string | A list of reference links of the indicator. |
Ignite.Filename.Event.Filename | string | Filename of the indicator. |
Ignite.Filename.Event.EventDetails | string | The event details in which the indicator was observed. |
Ignite.Filename.Event.Category | string | The category of the indicator. |
Ignite.Filename.Event.Fpid | string | The Ignite ID of the indicator. |
Ignite.Filename.Event.Timestamp | string | The time and date that the indicator was observed. |
Ignite.Filename.Event.Type | string | The indicator type. |
Ignite.Filename.Event.Uuid | string | The UUID of the indicator. |
Ignite.Filename.Event.Comment | string | The comment that was provided when the indicator was observed. |
Filename.Malicious.Description | string | The description of the malicious indicator. |
Filename.Malicious.Vendor | string | Vendor of the malicious filename. |
Filename.Name | string | The filename. |
Filename.Description | string | The description of the indicator. |
#
Command Example#
Context Example#
Human Readable Output#
Ignite Filename reputation for dummy.logReputation: Malicious
#
Events in which this IOC observed
Date Observed (UTC) Name Tags Jan 01, 1970 00:00 test info sample_tags All events and details (ignite): https://mock_dummy.com/cti/malware/iocs?sort_date=All%20Time&types=filename&query=%22dummy.log%22
#
ipLooks up the "IP" type indicator details. The reputation of the IP address is decided from the indicator score if it is found in the Ignite IOC database. Alternatively, the IP address is considered suspicious if it matches any one of the community's peer IP addresses.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | A comma-separated list of IP addresses. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
IP.Address | string | The IP address. |
IP.Malicious.Description | string | The description of the malicious indicator. |
IP.Malicious.Vendor | string | The vendor used to calculate the severity of the IP address. |
IP.Description | string | The description of the indicator. |
Ignite.IP.Event.Href | string | A list of reference links of the indicator. |
Ignite.IP.Event.Address | string | The IP address of the indicator. |
Ignite.IP.Event.EventDetails | string | The event details in which the indicator was observed. |
Ignite.IP.Event.Category | string | The category of the indicator. |
Ignite.IP.Event.Fpid | string | The Ignite ID of the indicator. |
Ignite.IP.Event.Timestamp | string | The time and date that the indicator was observed. |
Ignite.IP.Event.Type | string | The indicator type. |
Ignite.IP.Event.Uuid | string | The UUID of the indicator. |
Ignite.IP.Event.Comment | string | The comment that was provided when the indicator was observed. |
IP.Relationships.EntityA | string | The source of the relationship. |
IP.Relationships.EntityB | string | The destination of the relationship. |
IP.Relationships.Relationship | string | The name of the relationship. |
IP.Relationships.EntityAType | string | The type of the source of the relationship. |
IP.Relationships.EntityBType | string | The type of the destination of the relationship. |
Ignite.IP.id | String | Unique identifier for the document. |
Ignite.IP.author | String | The author of the document. |
Ignite.IP.author_id | String | The ID of the author of the document. |
Ignite.IP.date | Date | The date associated with the document. |
Ignite.IP.container_id | String | Unique identifier of the container. |
Ignite.IP.container_title | String | Title of the container. |
Ignite.IP.enrichments.bins | Number | Number of bins associated with the document. |
Ignite.IP.enrichments.bitcoin_addresses | String | Bitcoin addresses associated with the document. |
Ignite.IP.enrichments.cve_ids | String | CVE IDs associated with the document. |
Ignite.IP.enrichments.email_addresses | String | Email addresses associated with the document. |
Ignite.IP.enrichments.ethereum_addresses | String | Ethereum addresses associated with the document. |
Ignite.IP.enrichments.ip_addresses | String | IP addresses associated with the document. |
Ignite.IP.enrichments.location.country_code | String | Country code of the location associated with the document. |
Ignite.IP.enrichments.location.name | String | Name of the location associated with the document. |
Ignite.IP.enrichments.location.lat | Number | Latitude of the location associated with the document. |
Ignite.IP.enrichments.location.long | Number | Longitude of the location associated with the document. |
Ignite.IP.enrichments.monero_addresses | String | Monero addresses associated with the document. |
Ignite.IP.enrichments.social_media_handles | String | Social media handles associated with the document. |
Ignite.IP.enrichments.social_media_sites | String | Social media sites associated with the document. |
Ignite.IP.enrichments.translation.language | String | Language of the translation associated with the document. |
Ignite.IP.enrichments.translation.message | String | Translation message associated with the document. |
Ignite.IP.enrichments.url_domains | String | URL domains associated with the document. |
Ignite.IP.first_observed_at | Date | The first observed date of the document. |
Ignite.IP.last_observed_at | Date | The last observed date of the document. |
Ignite.IP.media.id | String | Unique identifier of the media. |
Ignite.IP.media.file_name | String | File name of the media. |
Ignite.IP.media.mime_type | String | MIME type of the media. |
Ignite.IP.media.phash | String | Perceptual hash of the media. |
Ignite.IP.media.safe_search | String | Safe search value of the media. |
Ignite.IP.media.size | Number | Size of the media. |
Ignite.IP.media.sort_date | Date | Date used for sorting the media. |
Ignite.IP.media.storage_uri | String | Storage URI of the media. |
Ignite.IP.media.type | String | Type of the media. |
Ignite.IP.message | String | Message associated with the document. |
Ignite.IP.message_id | String | ID of the message associated with the document. |
Ignite.IP.native_id | String | Native ID of the document. |
Ignite.IP.message_hash | String | Hash of the message associated with the document. |
Ignite.IP.parent_container_title | String | Title of the parent container. |
Ignite.IP.section | String | Section of the document. |
Ignite.IP.section_id | String | ID of the section. |
Ignite.IP.site | String | The site associated with the document. |
Ignite.IP.site_actor_handle | String | Actor handle of the site associated with the document. |
Ignite.IP.site_actor_alias | String | Actor alias of the site associated with the document. |
Ignite.IP.site_actor_url | String | Actor URL of the site associated with the document. |
Ignite.IP.site_actor_username | String | Actor username of the site associated with the document. |
Ignite.IP.site_source_uri | String | Source URI of the site associated with the document. |
Ignite.IP.site_title | String | Title of the site associated with the document. |
Ignite.IP.sort_date | Date | Date used for sorting the document. |
Ignite.IP.source_uri | String | Source URI of the document. |
Ignite.IP.title | String | Title of the document. |
Ignite.IP.title_id | String | ID of the title. |
Ignite.IP.type | String | Type of the indicator. |
Ignite.IP.value | string | The value of IP. |
Ignite.IP.href | string | The href of IP. |
Ignite.IP.entity_type | string | The entity type of IP. |
Ignite.IP.score.value | string | The score value of IP. |
Ignite.IP.score.last_scored_at | string | The last scored at of IP. |
Ignite.IP.score.raw_score | number | The raw score of IP. |
Ignite.IP.modified_at | string | The modified at of IP. |
Ignite.IP.created_at | string | The created at of IP. |
Ignite.IP.last_seen_at | string | The last seen at of IP. |
Ignite.IP.platform_urls.ignite | string | The ignite platform url of IP. |
Ignite.IP.apt_description | string | The apt description of IP. |
Ignite.IP.external_references.source_name | string | The source name of external reference. |
Ignite.IP.external_references.url | string | The url of external reference. |
Ignite.IP.hashes.md5 | string | The md5 hash of IP. |
Ignite.IP.hashes.sha1 | string | The sha1 hash of IP. |
Ignite.IP.hashes.sha256 | string | The sha256 hash of IP. |
Ignite.IP.malware_description | string | The malware description of IP. |
Ignite.IP.mitre_attack_ids.id | string | The mitre attack id of IP. |
Ignite.IP.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.IP.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.IP.relationships.iocs.id | string | The id of ioc. |
Ignite.IP.relationships.iocs.type | string | The type of ioc. |
Ignite.IP.relationships.iocs.value | string | The value of ioc. |
Ignite.IP.relationships.iocs.href | string | The href of ioc. |
Ignite.IP.sightings.source | string | The source of IP sighting. |
Ignite.IP.sightings.sighted_at | string | The sighted at of IP. |
Ignite.IP.sightings.tags | array | The tags of IP sighting. |
Ignite.IP.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.IP.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.IP.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.IP.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.IP.latest_sighting.source | string | The source of IP latest sighting. |
Ignite.IP.latest_sighting.sighted_at | string | The sighted at of IP latest sighting. |
Ignite.IP.latest_sighting.tags | array | The tags of IP latest sighting. |
Ignite.IP.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.IP.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.IP.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.IP.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.IP.total_sightings | integer | The total sightings of IP. |
#
Command example!ip ip=0.0.0.1
#
Context Example#
Human Readable Output#
Ignite IP Address reputation for 0.0.0.1Reputation: Malicious
ID IP Type Malware Description Tags Related IOCs Mitre Attack IDs Created At Modified At Last Seen At dummy_id_123 0.0.0.1 ipv4 dummy_malware_description dummy_latest_sighting_tag_1,
dummy_latest_sighting_tag_2,
dummy_latest_sighting_tag_3,
dummy_tag_1,
dummy_tag_2,
dummy_tag_3- type: file
value: dummy_latest_sighting_related_ioc_value_1
- type: domain
value: dummy_related_ioc_value_1.com- id: dummy_attack_id_123
name: dummy_attack_name
tactics:
values: DiscoveryApr 14, 2025 15:28 Apr 21, 2025 06:44 Apr 21, 2025 06:34 Platform Link(ignite): https://dummy.ignite.com
#
flashpoint-ignite-common-lookupLooks up details for indicators of types: "URL", "Domain", "File Hash", and "IP". The reputation of the indicator is decided from the indicator score if it is found in the Ignite IOC database.
#
Base Commandflashpoint-ignite-common-lookup
#
InputArgument Name | Description | Required |
---|---|---|
indicator | List of indicators. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Ignite.File.id | string | The ID of file. |
Ignite.File.type | String | Type of the indicator. |
Ignite.File.value | string | The value of file. |
Ignite.File.href | string | The href of file. |
Ignite.File.entity_type | string | The entity type of file. |
Ignite.File.score.value | string | The score value of file. |
Ignite.File.score.last_scored_at | string | The last scored time of file. |
Ignite.File.score.raw_score | number | The raw score of file. |
Ignite.File.modified_at | string | Last time when file was modified. |
Ignite.File.created_at | string | The creation time of file. |
Ignite.File.last_seen_at | string | The last seen time of file. |
Ignite.File.sort_date | string | The sort date of file. |
Ignite.File.platform_urls.ignite | string | The ignite platform url of file. |
Ignite.File.apt_description | string | The apt description of file. |
Ignite.File.external_references.source_name | string | The source name of external reference. |
Ignite.File.external_references.url | string | The url of external reference. |
Ignite.File.hashes.md5 | string | The md5 hash of file. |
Ignite.File.hashes.sha1 | string | The sha1 hash of file. |
Ignite.File.hashes.sha256 | string | The sha256 hash of file. |
Ignite.File.malware_description | string | The malware description of file. |
Ignite.File.mitre_attack_ids.id | string | The mitre attack id of file. |
Ignite.File.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.File.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.File.relationships.iocs.id | string | The id of ioc. |
Ignite.File.relationships.iocs.type | string | The type of ioc. |
Ignite.File.relationships.iocs.value | string | The value of ioc. |
Ignite.File.relationships.iocs.href | string | The href of ioc. |
Ignite.File.sightings.source | string | The source of file sighting. |
Ignite.File.sightings.sighted_at | string | The sighted at time of file. |
Ignite.File.sightings.tags | array | The tags of file sighting. |
Ignite.File.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.File.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.File.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.File.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.File.latest_sighting.source | string | The source of file latest sighting. |
Ignite.File.latest_sighting.sighted_at | string | The sighted at time of latest sighting of file. |
Ignite.File.latest_sighting.tags | array | The tags of file latest sighting. |
Ignite.File.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.File.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.File.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.File.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.File.total_sightings | integer | The total sightings of file. |
File.Malicious.Description | string | The description of the malicious indicator. |
File.Malicious.Vendor | string | Vendor of the malicious file. |
File.MD5 | string | MD5 type file. |
File.SHA1 | string | SHA1 type file. |
File.SHA512 | string | SHA512 type file. |
File.Relationships.EntityA | string | The source of the relationship. |
File.Relationships.EntityB | string | The destination of the relationship. |
File.Relationships.Relationship | string | The name of the relationship. |
File.Relationships.EntityAType | string | The type of the source of the relationship. |
File.Relationships.EntityBType | string | The type of the destination of the relationship. |
Ignite.Domain.id | string | The ID of domain. |
Ignite.Domain.type | String | Type of the indicator. |
Ignite.Domain.value | string | The value of domain. |
Ignite.Domain.href | string | The href of domain. |
Ignite.Domain.entity_type | string | The entity type of domain. |
Ignite.Domain.score.value | string | The score value of domain. |
Ignite.Domain.score.last_scored_at | string | The last scored time of domain. |
Ignite.Domain.score.raw_score | number | The raw score of domain. |
Ignite.Domain.modified_at | string | Last time when domain was modified. |
Ignite.Domain.created_at | string | The creation time of domain. |
Ignite.Domain.last_seen_at | string | The last seen time of domain. |
Ignite.Domain.sort_date | string | The sort date of domain. |
Ignite.Domain.platform_urls.ignite | string | The ignite platform url of domain. |
Ignite.Domain.apt_description | string | The apt description of domain. |
Ignite.Domain.external_references.source_name | string | The source name of external reference. |
Ignite.Domain.external_references.url | string | The url of external reference. |
Ignite.Domain.hashes.md5 | string | The md5 hash of domain. |
Ignite.Domain.hashes.sha1 | string | The sha1 hash of domain. |
Ignite.Domain.hashes.sha256 | string | The sha256 hash of domain. |
Ignite.Domain.malware_description | string | The malware description of domain. |
Ignite.Domain.mitre_attack_ids.id | string | The mitre attack id of domain. |
Ignite.Domain.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.Domain.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.Domain.relationships.iocs.id | string | The id of ioc. |
Ignite.Domain.relationships.iocs.type | string | The type of ioc. |
Ignite.Domain.relationships.iocs.value | string | The value of ioc. |
Ignite.Domain.relationships.iocs.href | string | The href of ioc. |
Ignite.Domain.sightings.source | string | The source of domain sighting. |
Ignite.Domain.sightings.sighted_at | string | The sighted at of domain. |
Ignite.Domain.sightings.tags | array | The tags of domain sighting. |
Ignite.Domain.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.Domain.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.Domain.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.Domain.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.Domain.latest_sighting.source | string | The source of domain latest sighting. |
Ignite.Domain.latest_sighting.sighted_at | string | The sighted at of domain latest sighting. |
Ignite.Domain.latest_sighting.tags | array | The tags of domain latest sighting. |
Ignite.Domain.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.Domain.total_sightings | integer | The total sightings of domain. |
Domain.Malicious.Description | string | The description of the malicious indicator. |
Domain.Malicious.Vendor | string | Vendor of the malicious indicator. |
Domain.Name | string | Name of the domain. |
Domain.Description | string | The description of the indicator. |
Domain.Relationships.EntityA | string | The source of the relationship. |
Domain.Relationships.EntityB | string | The destination of the relationship. |
Domain.Relationships.Relationship | string | The name of the relationship. |
Domain.Relationships.EntityAType | string | The type of the source of the relationship. |
Domain.Relationships.EntityBType | string | The type of the destination of the relationship. |
URL.Malicious.Description | string | The description of the malicious indicator. |
URL.Malicious.Vendor | string | Vendor of the malicious URL. |
URL.Data | string | The URL. |
URL.Relationships.EntityA | string | The source of the relationship. |
URL.Relationships.EntityB | string | The destination of the relationship. |
URL.Relationships.Relationship | string | The name of the relationship. |
URL.Relationships.EntityAType | string | The type of the source of the relationship. |
URL.Relationships.EntityBType | string | The type of the destination of the relationship. |
URL.Description | string | The description of the indicator. |
Ignite.URL.id | string | The ID of URL. |
Ignite.URL.type | String | Type of the indicator. |
Ignite.URL.value | string | The value of URL. |
Ignite.URL.href | string | The href of URL. |
Ignite.URL.entity_type | string | The entity type of URL. |
Ignite.URL.score.value | string | The score value of URL. |
Ignite.URL.score.last_scored_at | string | The last scored time of URL. |
Ignite.URL.score.raw_score | number | The raw score of URL. |
Ignite.URL.modified_at | string | Last time when URL was modified. |
Ignite.URL.created_at | string | The creation time of URL. |
Ignite.URL.last_seen_at | string | The last seen time of URL. |
Ignite.URL.sort_date | string | The sort date of URL. |
Ignite.URL.platform_urls.ignite | string | The ignite platform url of URL. |
Ignite.URL.apt_description | string | The apt description of URL. |
Ignite.URL.external_references.source_name | string | The source name of external reference. |
Ignite.URL.external_references.url | string | The url of external reference. |
Ignite.URL.hashes.md5 | string | The md5 hash of URL. |
Ignite.URL.hashes.sha1 | string | The sha1 hash of URL. |
Ignite.URL.hashes.sha256 | string | The sha256 hash of URL. |
Ignite.URL.malware_description | string | The malware description of URL. |
Ignite.URL.mitre_attack_ids.id | string | The mitre attack id of URL. |
Ignite.URL.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.URL.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.URL.relationships.iocs.id | string | The id of ioc. |
Ignite.URL.relationships.iocs.type | string | The type of ioc. |
Ignite.URL.relationships.iocs.value | string | The value of ioc. |
Ignite.URL.relationships.iocs.href | string | The href of ioc. |
Ignite.URL.sightings.source | string | The source of URL sighting. |
Ignite.URL.sightings.sighted_at | string | The sighted at time of URL. |
Ignite.URL.sightings.tags | array | The tags of URL sighting. |
Ignite.URL.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.URL.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.URL.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.URL.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.URL.latest_sighting.source | string | The source of URL latest sighting. |
Ignite.URL.latest_sighting.sighted_at | string | The sighted at time of latest sighting of URL. |
Ignite.URL.latest_sighting.tags | array | The tags of URL latest sighting. |
Ignite.URL.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.URL.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.URL.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.URL.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.URL.total_sightings | integer | The total sightings of URL. |
IP.Address | string | The IP address. |
IP.Malicious.Description | string | The description of the malicious indicator. |
IP.Malicious.Vendor | string | The vendor used to calculate the severity of the IP address. |
IP.Description | string | The description of the indicator. |
IP.Relationships.EntityA | string | The source of the relationship. |
IP.Relationships.EntityB | string | The destination of the relationship. |
IP.Relationships.Relationship | string | The name of the relationship. |
IP.Relationships.EntityAType | string | The type of the source of the relationship. |
IP.Relationships.EntityBType | string | The type of the destination of the relationship. |
Ignite.IP.id | String | Unique identifier for the document. |
Ignite.IP.type | String | Type of the indicator. |
Ignite.IP.value | string | The value of IP. |
Ignite.IP.href | string | The href of IP. |
Ignite.IP.entity_type | string | The entity type of IP. |
Ignite.IP.score.value | string | The score value of IP. |
Ignite.IP.score.last_scored_at | string | The last scored time of IP. |
Ignite.IP.score.raw_score | number | The raw score of IP. |
Ignite.IP.modified_at | string | Last time when IP was modified. |
Ignite.IP.created_at | string | The creation time of IP. |
Ignite.IP.last_seen_at | string | The last seen time of IP. |
Ignite.IP.platform_urls.ignite | string | The ignite platform url of IP. |
Ignite.IP.apt_description | string | The apt description of IP. |
Ignite.IP.external_references.source_name | string | The source name of external reference. |
Ignite.IP.external_references.url | string | The url of external reference. |
Ignite.IP.hashes.md5 | string | The md5 hash of IP. |
Ignite.IP.hashes.sha1 | string | The sha1 hash of IP. |
Ignite.IP.hashes.sha256 | string | The sha256 hash of IP. |
Ignite.IP.malware_description | string | The malware description of IP. |
Ignite.IP.mitre_attack_ids.id | string | The mitre attack id of IP. |
Ignite.IP.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.IP.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.IP.relationships.iocs.id | string | The id of ioc. |
Ignite.IP.relationships.iocs.type | string | The type of ioc. |
Ignite.IP.relationships.iocs.value | string | The value of ioc. |
Ignite.IP.relationships.iocs.href | string | The href of ioc. |
Ignite.IP.sightings.source | string | The source of IP sighting. |
Ignite.IP.sightings.sighted_at | string | The sighted at time of IP. |
Ignite.IP.sightings.tags | array | The tags of IP sighting. |
Ignite.IP.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.IP.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.IP.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.IP.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.IP.latest_sighting.source | string | The source of IP latest sighting. |
Ignite.IP.latest_sighting.sighted_at | string | The sighted at time of latest sighting of IP. |
Ignite.IP.latest_sighting.tags | array | The tags of IP latest sighting. |
Ignite.IP.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.IP.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.IP.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.IP.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.IP.total_sightings | integer | The total sightings of IP. |
#
Command example!flashpoint-ignite-common-lookup indicator="00000000000000000000000000000001"
#
Context Example#
Human Readable Output#
Ignite File reputation for 00000000000000000000000000000001Reputation: Malicious
ID Type Hashes Malware Description Tags Related IOCs Mitre Attack IDs Created At Modified At Last Seen At dummy_id file md5: 00000000000000000000000000000001
sha1: 0000000000000000000000000000000000000001
sha256: 0000000000000000000000000000000000000000000000000000000000000001dummy description. malware:pony,
os:windows,
source:flashpoint_detection,
type:stealer- type: file
value: 00000000000000000000000000000002- id: dummy_mitre_id
name: dummy name
tactics:
values: Defense EvasionJan 01, 2025 01:00 Jan 02, 2025 01:00 Jan 02, 2025 01:00 Platform Link(ignite): https://mock_dummy.com/cti/malware/iocs/dummy_id
#
flashpoint-ignite-indicator-getLooks up details for indicators of types "URL", "Domain", "File Hash", and "IP" using their ID. The reputation of the indicator is decided from the indicator score if it is found in the Ignite IOC database.
#
Base Commandflashpoint-ignite-indicator-get
#
InputArgument Name | Description | Required |
---|---|---|
indicator_id | ID of the indicator. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Ignite.File.id | string | The ID of file. |
Ignite.File.type | String | Type of the indicator. |
Ignite.File.value | string | The value of file. |
Ignite.File.href | string | The href of file. |
Ignite.File.entity_type | string | The entity type of file. |
Ignite.File.score.value | string | The score value of file. |
Ignite.File.score.last_scored_at | string | The last scored time of file. |
Ignite.File.score.raw_score | number | The raw score of file. |
Ignite.File.modified_at | string | Last time when file was modified. |
Ignite.File.created_at | string | The creation time of file. |
Ignite.File.last_seen_at | string | The last seen time of file. |
Ignite.File.sort_date | string | The sort date of file. |
Ignite.File.platform_urls.ignite | string | The ignite platform url of file. |
Ignite.File.apt_description | string | The apt description of file. |
Ignite.File.external_references.source_name | string | The source name of external reference. |
Ignite.File.external_references.url | string | The url of external reference. |
Ignite.File.hashes.md5 | string | The md5 hash of file. |
Ignite.File.hashes.sha1 | string | The sha1 hash of file. |
Ignite.File.hashes.sha256 | string | The sha256 hash of file. |
Ignite.File.malware_description | string | The malware description of file. |
Ignite.File.mitre_attack_ids.id | string | The mitre attack id of file. |
Ignite.File.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.File.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.File.relationships.iocs.id | string | The id of ioc. |
Ignite.File.relationships.iocs.type | string | The type of ioc. |
Ignite.File.relationships.iocs.value | string | The value of ioc. |
Ignite.File.relationships.iocs.href | string | The href of ioc. |
Ignite.File.sightings.source | string | The source of file sighting. |
Ignite.File.sightings.sighted_at | string | The sighted at time of file. |
Ignite.File.sightings.tags | array | The tags of file sighting. |
Ignite.File.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.File.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.File.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.File.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.File.latest_sighting.source | string | The source of file latest sighting. |
Ignite.File.latest_sighting.sighted_at | string | The sighted at time of latest sighting of file. |
Ignite.File.latest_sighting.tags | array | The tags of file latest sighting. |
Ignite.File.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.File.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.File.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.File.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.File.total_sightings | integer | The total sightings of file. |
File.Malicious.Description | string | The description of the malicious indicator. |
File.Malicious.Vendor | string | Vendor of the malicious file. |
File.MD5 | string | MD5 type file. |
File.SHA1 | string | SHA1 type file. |
File.SHA512 | string | SHA512 type file. |
File.Relationships.EntityA | string | The source of the relationship. |
File.Relationships.EntityB | string | The destination of the relationship. |
File.Relationships.Relationship | string | The name of the relationship. |
File.Relationships.EntityAType | string | The type of the source of the relationship. |
File.Relationships.EntityBType | string | The type of the destination of the relationship. |
Ignite.File.historical_tags | string | The tags of File. |
Ignite.File.reports.html | string | Platform url to access the report of the indicator. |
Ignite.File.reports.json | string | API url of the report of the indicator. |
Ignite.Domain.id | string | The ID of domain. |
Ignite.Domain.type | String | Type of the indicator. |
Ignite.Domain.value | string | The value of domain. |
Ignite.Domain.href | string | The href of domain. |
Ignite.Domain.entity_type | string | The entity type of domain. |
Ignite.Domain.score.value | string | The score value of domain. |
Ignite.Domain.score.last_scored_at | string | The last scored time of domain. |
Ignite.Domain.score.raw_score | number | The raw score of domain. |
Ignite.Domain.modified_at | string | Last time when domain was modified. |
Ignite.Domain.created_at | string | The creation time of domain. |
Ignite.Domain.last_seen_at | string | The last seen time of domain. |
Ignite.Domain.sort_date | string | The sort date of domain. |
Ignite.Domain.platform_urls.ignite | string | The ignite platform url of domain. |
Ignite.Domain.apt_description | string | The apt description of domain. |
Ignite.Domain.external_references.source_name | string | The source name of external reference. |
Ignite.Domain.external_references.url | string | The url of external reference. |
Ignite.Domain.hashes.md5 | string | The md5 hash of domain. |
Ignite.Domain.hashes.sha1 | string | The sha1 hash of domain. |
Ignite.Domain.hashes.sha256 | string | The sha256 hash of domain. |
Ignite.Domain.malware_description | string | The malware description of domain. |
Ignite.Domain.mitre_attack_ids.id | string | The mitre attack id of domain. |
Ignite.Domain.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.Domain.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.Domain.relationships.iocs.id | string | The id of ioc. |
Ignite.Domain.relationships.iocs.type | string | The type of ioc. |
Ignite.Domain.relationships.iocs.value | string | The value of ioc. |
Ignite.Domain.relationships.iocs.href | string | The href of ioc. |
Ignite.Domain.sightings.source | string | The source of domain sighting. |
Ignite.Domain.sightings.sighted_at | string | The sighted at of domain. |
Ignite.Domain.sightings.tags | array | The tags of domain sighting. |
Ignite.Domain.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.Domain.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.Domain.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.Domain.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.Domain.latest_sighting.source | string | The source of domain latest sighting. |
Ignite.Domain.latest_sighting.sighted_at | string | The sighted at of domain latest sighting. |
Ignite.Domain.latest_sighting.tags | array | The tags of domain latest sighting. |
Ignite.Domain.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.Domain.total_sightings | integer | The total sightings of domain. |
Domain.Malicious.Description | string | The description of the malicious indicator. |
Domain.Malicious.Vendor | string | Vendor of the malicious indicator. |
Domain.Name | string | Name of the domain. |
Domain.Description | string | The description of the indicator. |
Domain.Relationships.EntityA | string | The source of the relationship. |
Domain.Relationships.EntityB | string | The destination of the relationship. |
Domain.Relationships.Relationship | string | The name of the relationship. |
Domain.Relationships.EntityAType | string | The type of the source of the relationship. |
Domain.Relationships.EntityBType | string | The type of the destination of the relationship. |
Ignite.Domain.historical_tags | string | The tags of Domain. |
Ignite.Domain.reports.html | string | Platform url to access the report of the indicator. |
Ignite.Domain.reports.json | string | API url of the report of the indicator. |
URL.Malicious.Description | string | The description of the malicious indicator. |
URL.Malicious.Vendor | string | Vendor of the malicious URL. |
URL.Data | string | The URL. |
URL.Relationships.EntityA | string | The source of the relationship. |
URL.Relationships.EntityB | string | The destination of the relationship. |
URL.Relationships.Relationship | string | The name of the relationship. |
URL.Relationships.EntityAType | string | The type of the source of the relationship. |
URL.Relationships.EntityBType | string | The type of the destination of the relationship. |
URL.Description | string | The description of the indicator. |
Ignite.URL.id | string | The ID of URL. |
Ignite.URL.type | String | Type of the indicator. |
Ignite.URL.value | string | The value of URL. |
Ignite.URL.href | string | The href of URL. |
Ignite.URL.entity_type | string | The entity type of URL. |
Ignite.URL.score.value | string | The score value of URL. |
Ignite.URL.score.last_scored_at | string | The last scored time of URL. |
Ignite.URL.score.raw_score | number | The raw score of URL. |
Ignite.URL.modified_at | string | Last time when URL was modified. |
Ignite.URL.created_at | string | The creation time of URL. |
Ignite.URL.last_seen_at | string | The last seen time of URL. |
Ignite.URL.sort_date | string | The sort date of URL. |
Ignite.URL.platform_urls.ignite | string | The ignite platform url of URL. |
Ignite.URL.apt_description | string | The apt description of URL. |
Ignite.URL.external_references.source_name | string | The source name of external reference. |
Ignite.URL.external_references.url | string | The url of external reference. |
Ignite.URL.hashes.md5 | string | The md5 hash of URL. |
Ignite.URL.hashes.sha1 | string | The sha1 hash of URL. |
Ignite.URL.hashes.sha256 | string | The sha256 hash of URL. |
Ignite.URL.malware_description | string | The malware description of URL. |
Ignite.URL.mitre_attack_ids.id | string | The mitre attack id of URL. |
Ignite.URL.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.URL.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.URL.relationships.iocs.id | string | The id of ioc. |
Ignite.URL.relationships.iocs.type | string | The type of ioc. |
Ignite.URL.relationships.iocs.value | string | The value of ioc. |
Ignite.URL.relationships.iocs.href | string | The href of ioc. |
Ignite.URL.sightings.source | string | The source of URL sighting. |
Ignite.URL.sightings.sighted_at | string | The sighted at time of URL. |
Ignite.URL.sightings.tags | array | The tags of URL sighting. |
Ignite.URL.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.URL.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.URL.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.URL.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.URL.latest_sighting.source | string | The source of URL latest sighting. |
Ignite.URL.latest_sighting.sighted_at | string | The sighted at time of latest sighting of URL. |
Ignite.URL.latest_sighting.tags | array | The tags of URL latest sighting. |
Ignite.URL.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.URL.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.URL.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.URL.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.URL.total_sightings | integer | The total sightings of URL. |
Ignite.URL.historical_tags | string | The tags of URL. |
Ignite.URL.reports.html | string | Platform url to access the report of the indicator. |
Ignite.URL.reports.json | string | API url of the report of the indicator. |
IP.Address | string | The IP address. |
IP.Malicious.Description | string | The description of the malicious indicator. |
IP.Malicious.Vendor | string | The vendor used to calculate the severity of the IP address. |
IP.Description | string | The description of the indicator. |
IP.Relationships.EntityA | string | The source of the relationship. |
IP.Relationships.EntityB | string | The destination of the relationship. |
IP.Relationships.Relationship | string | The name of the relationship. |
IP.Relationships.EntityAType | string | The type of the source of the relationship. |
IP.Relationships.EntityBType | string | The type of the destination of the relationship. |
Ignite.IP.id | String | Unique identifier for the document. |
Ignite.IP.type | String | Type of the indicator. |
Ignite.IP.value | string | The value of IP. |
Ignite.IP.href | string | The href of IP. |
Ignite.IP.entity_type | string | The entity type of IP. |
Ignite.IP.score.value | string | The score value of IP. |
Ignite.IP.score.last_scored_at | string | The last scored time of IP. |
Ignite.IP.score.raw_score | number | The raw score of IP. |
Ignite.IP.modified_at | string | Last time when IP was modified. |
Ignite.IP.created_at | string | The creation time of IP. |
Ignite.IP.last_seen_at | string | The last seen time of IP. |
Ignite.IP.platform_urls.ignite | string | The ignite platform url of IP. |
Ignite.IP.apt_description | string | The apt description of IP. |
Ignite.IP.external_references.source_name | string | The source name of external reference. |
Ignite.IP.external_references.url | string | The url of external reference. |
Ignite.IP.hashes.md5 | string | The md5 hash of IP. |
Ignite.IP.hashes.sha1 | string | The sha1 hash of IP. |
Ignite.IP.hashes.sha256 | string | The sha256 hash of IP. |
Ignite.IP.malware_description | string | The malware description of IP. |
Ignite.IP.mitre_attack_ids.id | string | The mitre attack id of IP. |
Ignite.IP.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.IP.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.IP.relationships.iocs.id | string | The id of ioc. |
Ignite.IP.relationships.iocs.type | string | The type of ioc. |
Ignite.IP.relationships.iocs.value | string | The value of ioc. |
Ignite.IP.relationships.iocs.href | string | The href of ioc. |
Ignite.IP.sightings.source | string | The source of IP sighting. |
Ignite.IP.sightings.sighted_at | string | The sighted at time of IP. |
Ignite.IP.sightings.tags | array | The tags of IP sighting. |
Ignite.IP.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.IP.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.IP.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.IP.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.IP.latest_sighting.source | string | The source of IP latest sighting. |
Ignite.IP.latest_sighting.sighted_at | string | The sighted at time of latest sighting of IP. |
Ignite.IP.latest_sighting.tags | array | The tags of IP latest sighting. |
Ignite.IP.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.IP.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.IP.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.IP.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.IP.total_sightings | integer | The total sightings of IP. |
Ignite.IP.historical_tags | string | The tags of IP. |
Ignite.IP.reports.html | string | Platform url to access the report of the indicator. |
Ignite.IP.reports.json | string | API url of the report of the indicator. |
#
Command example!flashpoint-ignite-indicator-get indicator_id=dummy_id
#
Context Example#
Human Readable Output#
Ignite File reputation for 00000000000000000000000000000001Reputation: Malicious
ID Type Hashes Malware Description Tags Related IOCs Hashes Mitre Attack IDs Reports Created At Modified At Last Seen At dummy_id file md5: 00000000000000000000000000000001
sha1: 0000000000000000000000000000000000000001
sha256: 0000000000000000000000000000000000000000000000000000000000000001dummy description. malware:pony,
os:windows,
source:flashpoint_detection,
type:stealer- type: file
value: 00000000000000000000000000000002- id: dummy_mitre_id
name: dummy name
tactics:
values: Defense Evasion- html: https://mock_dummy.com/cti/intelligence/report/report_1
json: https://mock_dummy.com/finished-intelligence/v1/reports/report_1
- html: https://mock_dummy.com/cti/intelligence/report/report_2
json: https://mock_dummy.com/finished-intelligence/v1/reports/report_2Jan 01, 2025 01:00 Jan 02, 2025 01:00 Jan 02, 2025 01:00 Platform Link(ignite): https://mock_dummy.com/cti/malware/iocs/dummy_id
#
urlLooks up the "URL" type indicator details. The reputation of the URL is decided from the indicator score if it is found in the Ignite IOC database.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | A comma-separated list of URLs. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Ignite.Url.Event.Href | string | A list of reference links of the indicator. |
Ignite.Url.Event.Url | string | URL of the indicator. |
Ignite.Url.Event.EventDetails | string | The event details in which the indicator was observed. |
Ignite.Url.Event.Category | string | The category of the indicator. |
Ignite.Url.Event.Fpid | string | The Flashpoint ID of the indicator. |
Ignite.Url.Event.Timestamp | string | The time and date that the indicator was observed. |
Ignite.Url.Event.Type | string | The indicator type. |
Ignite.Url.Event.Uuid | string | The UUID of the indicator. |
Ignite.Url.Event.Comment | string | The comment that was provided when the indicator was observed. |
URL.Malicious.Description | string | The description of the malicious indicator. |
URL.Malicious.Vendor | string | Vendor of the malicious URL. |
URL.Data | string | The URL. |
URL.Relationships.EntityA | string | The source of the relationship. |
URL.Relationships.EntityB | string | The destination of the relationship. |
URL.Relationships.Relationship | string | The name of the relationship. |
URL.Relationships.EntityAType | string | The type of the source of the relationship. |
URL.Relationships.EntityBType | string | The type of the destination of the relationship. |
URL.Description | string | The description of the indicator. |
Ignite.URL.id | string | The ID of URL. |
Ignite.URL.type | string | Type of the indicator. |
Ignite.URL.value | string | The value of URL. |
Ignite.URL.href | string | The href of URL. |
Ignite.URL.entity_type | string | The entity type of URL. |
Ignite.URL.score.value | string | The score value of URL. |
Ignite.URL.score.last_scored_at | string | The last scored time of URL. |
Ignite.URL.score.raw_score | number | The raw score of URL. |
Ignite.URL.modified_at | string | Last time when URL was modified. |
Ignite.URL.created_at | string | The creation time of URL. |
Ignite.URL.last_seen_at | string | The last seen time of URL. |
Ignite.URL.sort_date | string | The sort date of URL. |
Ignite.URL.platform_urls.ignite | string | The ignite platform url of URL. |
Ignite.URL.apt_description | string | The apt description of URL. |
Ignite.URL.external_references.source_name | string | The source name of external reference. |
Ignite.URL.external_references.url | string | The url of external reference. |
Ignite.URL.hashes.md5 | string | The md5 hash of URL. |
Ignite.URL.hashes.sha1 | string | The sha1 hash of URL. |
Ignite.URL.hashes.sha256 | string | The sha256 hash of URL. |
Ignite.URL.malware_description | string | The malware description of URL. |
Ignite.URL.mitre_attack_ids.id | string | The mitre attack id of URL. |
Ignite.URL.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.URL.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.URL.relationships.iocs.id | string | The id of ioc. |
Ignite.URL.relationships.iocs.type | string | The type of ioc. |
Ignite.URL.relationships.iocs.value | string | The value of ioc. |
Ignite.URL.relationships.iocs.href | string | The href of ioc. |
Ignite.URL.sightings.source | string | The source of URL sighting. |
Ignite.URL.sightings.sighted_at | string | The sighted at time of URL. |
Ignite.URL.sightings.tags | array | The tags of URL sighting. |
Ignite.URL.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.URL.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.URL.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.URL.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.URL.latest_sighting.source | string | The source of URL latest sighting. |
Ignite.URL.latest_sighting.sighted_at | string | The sighted at time of latest sighting of URL. |
Ignite.URL.latest_sighting.tags | array | The tags of URL latest sighting. |
Ignite.URL.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.URL.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.URL.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.URL.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.URL.total_sightings | integer | The total sightings of URL. |
#
Command Example#
Context Example#
Human Readable Outputhttp://dummy.com#
Ignite URL reputation forReputation: Suspicious
ID URL Malware Description Tags Related IOCs Created At Modified At Last Seen At dummy-id-123 http://dummy.com Dummy malware description dummy_latest_sighting_tag_1,
dummy_latest_sighting_tag_2,
dummy-tag-1,
dummy-tag-2- type: url
value: http://dummyurl.com
- type: ipv4
value: 0.0.0.1Apr 01, 2025 00:00 Apr 01, 2025 00:00 Apr 01, 2025 00:00 Platform Link(ignite): https://dummy-platform.com/dummy-url
#
domainLooks up the "Domain" type indicator details. The reputation of the domain is decided from the indicator score if it is found in the Ignite IOC database.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | A comma-separated list of domains. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Ignite.Domain.Event.Href | string | A list of reference links of the indicator. |
Ignite.Domain.Event.Domain | string | The domain of the indicator. |
Ignite.Domain.Event.EventDetails | string | The event details in which the indicator was observed. |
Ignite.Domain.Event.Category | string | The category of the indicator. |
Ignite.Domain.Event.Fpid | string | The Ignite ID of the indicator. |
Ignite.Domain.Event.Timestamp | string | The time and date that the indicator was observed. |
Ignite.Domain.Event.Type | string | The indicator type. |
Ignite.Domain.Event.Uuid | string | The UUID of the indicator. |
Ignite.Domain.Event.Comment | string | The comment that was provided when the indicator was observed. |
Ignite.Domain.id | string | The ID of domain. |
Ignite.Domain.type | string | Type of the indicator. |
Ignite.Domain.value | string | The value of domain. |
Ignite.Domain.href | string | The href of domain. |
Ignite.Domain.entity_type | string | The entity type of domain. |
Ignite.Domain.score.value | string | The score value of domain. |
Ignite.Domain.score.last_scored_at | string | The last scored time of domain. |
Ignite.Domain.score.raw_score | number | The raw score of domain. |
Ignite.Domain.modified_at | string | Last time when domain was modified. |
Ignite.Domain.created_at | string | The creation time of domain. |
Ignite.Domain.last_seen_at | string | The last seen time of domain. |
Ignite.Domain.sort_date | string | The sort date of domain. |
Ignite.Domain.platform_urls.ignite | string | The ignite platform url of domain. |
Ignite.Domain.apt_description | string | The apt description of domain. |
Ignite.Domain.external_references.source_name | string | The source name of external reference. |
Ignite.Domain.external_references.url | string | The url of external reference. |
Ignite.Domain.hashes.md5 | string | The md5 hash of domain. |
Ignite.Domain.hashes.sha1 | string | The sha1 hash of domain. |
Ignite.Domain.hashes.sha256 | string | The sha256 hash of domain. |
Ignite.Domain.malware_description | string | The malware description of domain. |
Ignite.Domain.mitre_attack_ids.id | string | The mitre attack id of domain. |
Ignite.Domain.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.Domain.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.Domain.relationships.iocs.id | string | The id of ioc. |
Ignite.Domain.relationships.iocs.type | string | The type of ioc. |
Ignite.Domain.relationships.iocs.value | string | The value of ioc. |
Ignite.Domain.relationships.iocs.href | string | The href of ioc. |
Ignite.Domain.sightings.source | string | The source of domain sighting. |
Ignite.Domain.sightings.sighted_at | string | The sighted at of domain. |
Ignite.Domain.sightings.tags | array | The tags of domain sighting. |
Ignite.Domain.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.Domain.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.Domain.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.Domain.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.Domain.latest_sighting.source | string | The source of domain latest sighting. |
Ignite.Domain.latest_sighting.sighted_at | string | The sighted at of domain latest sighting. |
Ignite.Domain.latest_sighting.tags | array | The tags of domain latest sighting. |
Ignite.Domain.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.Domain.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.Domain.total_sightings | integer | The total sightings of domain. |
Domain.Malicious.Description | string | The description of the malicious indicator. |
Domain.Malicious.Vendor | string | Vendor of the malicious indicator. |
Domain.Name | string | Name of the domain. |
Domain.Description | string | The description of the indicator. |
Domain.Relationships.EntityA | string | The source of the relationship. |
Domain.Relationships.EntityB | string | The destination of the relationship. |
Domain.Relationships.Relationship | string | The name of the relationship. |
Domain.Relationships.EntityAType | string | The type of the source of the relationship. |
Domain.Relationships.EntityBType | string | The type of the destination of the relationship. |
#
Command example!domain domain="dummy_domain.com"
#
Context Example#
Human Readable Output#
Ignite Domain reputation for dummy_domain.comReputation: Malicious
ID Domain Malware Description Tags Related IOCs Created At Modified At Last Seen At dummy_id dummy_domain.com This is dummy description. extracted_config:true,
malware:xworm,
source:flashpoint_extraction- type: file
value: dummy_valueJan 01, 2025 01:00 Jan 02, 2025 01:00 Jan 02, 2025 01:00 Platform Link(ignite): https://mock_dummy.com/cti/malware/iocs/dummy_id
#
fileLooks up the "File" type indicator details. The reputation of the file is decided from the indicator score if it is found in the Ignite IOC database.
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | List of files. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Reliability | string | The reliability of the vendor. |
DBotScore.Score | number | The actual score. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
Ignite.File.Event.Href | string | A list of reference links of the indicator. |
Ignite.File.Event.MD5 | string | MD5 file hash of the indicator. |
Ignite.File.Event.SHA1 | string | SHA1 file hash of the indicator. |
Ignite.File.Event.SHA256 | string | SHA256 file hash of the indicator. |
Ignite.File.Event.SHA512 | string | SHA512 file hash of the indicator. |
Ignite.File.Event.SSDeep | string | SSDeep file hash of the indicator. |
Ignite.File.Event.EventDetails | string | The event details in which the indicator was observed. |
Ignite.File.Event.Category | string | The category of the indicator. |
Ignite.File.Event.Fpid | string | The Ignite ID of the indicator. |
Ignite.File.Event.Timestamp | string | The time and date that the indicator was observed. |
Ignite.File.Event.Type | string | The indicator type. |
Ignite.File.Event.Uuid | string | The UUID of the indicator. |
Ignite.File.Event.Comment | string | The comment that was provided when the indicator was observed. |
Ignite.File.id | string | The ID of file. |
Ignite.File.type | string | Type of the indicator. |
Ignite.File.value | string | The value of file. |
Ignite.File.href | string | The href of file. |
Ignite.File.entity_type | string | The entity type of file. |
Ignite.File.score.value | string | The score value of file. |
Ignite.File.score.last_scored_at | string | The last scored time of file. |
Ignite.File.score.raw_score | number | The raw score of file. |
Ignite.File.modified_at | string | Last time when file was modified. |
Ignite.File.created_at | string | The creation time of file. |
Ignite.File.last_seen_at | string | The last seen time of file. |
Ignite.File.sort_date | string | The sort date of file. |
Ignite.File.platform_urls.ignite | string | The ignite platform url of file. |
Ignite.File.apt_description | string | The apt description of file. |
Ignite.File.external_references.source_name | string | The source name of external reference. |
Ignite.File.external_references.url | string | The url of external reference. |
Ignite.File.hashes.md5 | string | The md5 hash of file. |
Ignite.File.hashes.sha1 | string | The sha1 hash of file. |
Ignite.File.hashes.sha256 | string | The sha256 hash of file. |
Ignite.File.malware_description | string | The malware description of file. |
Ignite.File.mitre_attack_ids.id | string | The mitre attack id of file. |
Ignite.File.mitre_attack_ids.name | string | The name of mitre attack id. |
Ignite.File.mitre_attack_ids.tactics | unknown | A list of tactics associated with mitre attack id. |
Ignite.File.relationships.iocs.id | string | The id of ioc. |
Ignite.File.relationships.iocs.type | string | The type of ioc. |
Ignite.File.relationships.iocs.value | string | The value of ioc. |
Ignite.File.relationships.iocs.href | string | The href of ioc. |
Ignite.File.sightings.source | string | The source of file sighting. |
Ignite.File.sightings.sighted_at | string | The sighted at time of file. |
Ignite.File.sightings.tags | array | The tags of file sighting. |
Ignite.File.sightings.related_iocs.id | string | The ID of related IOC. |
Ignite.File.sightings.related_iocs.type | string | The type of related IOC. |
Ignite.File.sightings.related_iocs.value | string | The value of related IOC. |
Ignite.File.sightings.related_iocs.href | string | The href of related IOC. |
Ignite.File.latest_sighting.source | string | The source of file latest sighting. |
Ignite.File.latest_sighting.sighted_at | string | The sighted at time of latest sighting of file. |
Ignite.File.latest_sighting.tags | array | The tags of file latest sighting. |
Ignite.File.latest_sighting.related_iocs.id | string | The ID of related IOC. |
Ignite.File.latest_sighting.related_iocs.type | string | The type of related IOC. |
Ignite.File.latest_sighting.related_iocs.value | string | The value of related IOC. |
Ignite.File.latest_sighting.related_iocs.href | string | The href of related IOC. |
Ignite.File.total_sightings | integer | The total sightings of file. |
File.Malicious.Description | string | The description of the malicious indicator. |
File.Malicious.Vendor | string | Vendor of the malicious file. |
File.MD5 | string | MD5 type file. |
File.SHA1 | string | SHA1 type file. |
File.SHA256 | string | SHA256 type file. |
File.SHA512 | string | SHA512 type file. |
File.SSDeep | string | SSDeep type file. |
File.Relationships.EntityA | string | The source of the relationship. |
File.Relationships.EntityB | string | The destination of the relationship. |
File.Relationships.Relationship | string | The name of the relationship. |
File.Relationships.EntityAType | string | The type of the source of the relationship. |
File.Relationships.EntityBType | string | The type of the destination of the relationship. |
#
Command Example#
Context Example#
Human Readable Output#
Ignite File reputation for 00000000000000000000000000000001Reputation: Malicious
ID Hash Type Hashes Malware Description Tags Related IOCs Mitre Attack IDs Created At Modified At Last Seen At dummy_id md5 md5: 00000000000000000000000000000001
sha1: 0000000000000000000000000000000000000001
sha256: 0000000000000000000000000000000000000000000000000000000000000001dummy description. malware:pony,
os:windows,
source:flashpoint_detection,
type:stealer- type: file
value: 00000000000000000000000000000002- id: dummy_mitre_id
name: dummy name
tactics:
values: Defense EvasionJan 01, 2025 01:00 Jan 02, 2025 01:00 Jan 02, 2025 01:00 Platform Link(ignite): https://mock_dummy.com/cti/malware/iocs/dummy_id
#
Migration GuideNote:
For fetching incidents, set the First Fetch time to the previous integration's Incidents Fetch Interval time. This might create duplicate alerts, but it will ensure that no alert data is lost.
#
Migrated CommandsSome of the previous integration's commands have been migrated to new commands. Below is the table showing the commands that have been migrated to the new ones.
Flashpoint Command | Migrated Ignite Command |
---|---|
ip | ip |
domain | domain |
url | url |
file | file |
flashpoint-search-intelligence-reports | flashpoint-ignite-intelligence-report-search |
flashpoint-get-single-intelligence-report | flashpoint-ignite-intelligence-report-get |
flashpoint-get-related-reports | flashpoint-ignite-intelligence-related-report-list |
flashpoint-get-single-event | flashpoint-ignite-event-get |
flashpoint-get-events | flashpoint-ignite-event-list |
flashpoint-common-lookup | flashpoint-ignite-common-lookup |
flashpoint-alert-list | flashpoint-ignite-alert-list |
flashpoint-compromised-credentials-list | flashpoint-ignite-compromised-credentials-list |
#
Deprecated CommandsSome of the previous integration's commands have been deprecated from the Flashpoint API side. Below is the table showing the commands that have been deprecated for which, there is no replacement available.
Deprecated Command |
---|
flashpoint-get-forum-details |
flashpoint-get-forum-room-details |
flashpoint-get-forum-user-details |
flashpoint-get-forum-post-details |
flashpoint-search-forum-sites |
flashpoint-search-forum-posts |
filename |