Skip to main content

Cyware Orchestrate

Flashpoint

App Vendor: Flashpoint

App Category: Data Enrichment & Threat Intelligence

App Version in Orchestrate: 1.1.2

API version: 4.0.0

Note

The endpoints in the Flashpoint app are deprecated. You can use the Flashpoint Ignite app, which provides enhanced features and improved functionality. For more information, see Flashpoint API documentation.

About App

The Flashpoint app allows security teams to integrate with the Flashpoint enterprise application to help analysts identify threats and mitigate critical security risks. Flashpoint shares insightful and relevant context about a threat and empowers analysts to take better decisions. This helps analysts to prioritize intelligence, focus on critical areas, and respond accurately.

The Flashpoint app in the Orchestrate application performs the following actions:

Action Name

Description

Breach Check

This action provides details of the breach based on a domain or Email ID.

Retrieve an Intelligence Report

This action is used to retrieve a report using the report ID.

Search Marketplace

This action searches a specific marketplace and retrieve details about the marketplace.

Search Intelligence Reports

This action searches intelligence reports using queries.

Search Indicator

This action provides details based on an indicator.

Search Vulnerability

This action provides the vulnerability details based on the vulnerability ID.

Universal Search

This action searches across the network and retrieve details based on the search query.

Configuration Parameters

The following configuration parameters are required for the AWS WAF v2 app to communicate with the AWS WAF v2 Enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

API Token

Enter the API token to authenticate the Flashpoint API endpoints.

Password

Required

Base URL

Enter the base URL for the API endpoints.

Example:

https://fp.tools/api/v4/

Text

Required

Action: Breach Check

This action provides details of the breach based on a domain or Email ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Email or Domain

Enter the data type for the breach check.

Text

Required

Allowed values:

  • domain

  • email

Email ID or Domain

Enter the value of the data to be searched based on the selected data type (domain or Email ID).

Example:

  • "example.com",

  • "value@value.com"

Text

Required

Example Request

[
    {
        "email_domain": "domain",
        "emailid_domain": "cyware.com"
    }
]
Action: Retrieve an Intelligence Report

This action is used to retrieve a report using the report ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report ID

Enter the ID of the Intelligence Report.

Example:

lTYQZRtoQeyKYMNuwv0dEA

Text

Required

Example Request

[
    {
        "report_id": "lTYQZRtoQeyKYMNuwv0dEA"
    }
]
Action: Search Marketplace

This action searches a specific marketplace and retrieve details about the marketplace.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Marketplace

Enter the details to search the marketplace.

Example:

silkroad

Text

Required

Example Request

[
    {
        "market_place": "silkroad"
    }
]
Action: Search Intelligence Reports

This action searches reports using queries.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter a query to search across intelligence report bodies, titles, summaries, and sources.

Example:

"recent malware incidents"

Text

Required

Limit

Enter the limit of search results displayed that matches the query.

Integer

Optional

Default value: 10

Example Request

[
    {
        "limit": 3,
        "query": "recent malware incidents"
    }
]
Action: Search Indicator

This action provides details based on an indicator.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Indicator

Enter the indicator to be searched.

Example:

"www.exampleindicator.com"

Text

Required

Example Request

[
    {
        "indicator": "www.exampleindicator.com"
    }
]
Action: Search Vulnerability

This action provides the vulnerability details based on the vulnerability ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

CVE ID

Enter the vulnerability ID.

Example:

"CVE-1999-0555"

Text

Required

Example Request

[
    {
        "cve_id": "CVE-1999-0555"
    }
]