Flashpoint Ignite Threat Intelligence Engine Integration User Guide
  • 11 Dec 2025
  • 19 Minutes to read
  • Dark
    Light
  • PDF

Flashpoint Ignite Threat Intelligence Engine Integration User Guide

  • Dark
    Light
  • PDF

Article summary

Software Version
This guide applies to the Flashpoint Ignite Threat Intelligence Engine App version 1.0.5.

Overview

The Flashpoint Ignite Threat Intelligence Engine App in ThreatConnect® ingests Alerts, Attributes, Events, Reports, and Vulnerabilities from Flashpoint® Ignite and creates corresponding objects in ThreatConnect with select Flashpoint Ignite metadata:

  • Alerts are created as Event Groups in ThreatConnect. Some Alerts have associated images that are created as Document Groups. Attributes associated to Events are created as Address, File, Host, or URL Indicators in ThreatConnect.
  • Events are created as Event Groups in ThreatConnect. In addition, Malware tags on ingested Events from Flashpoint Ignite are created as Malware Groups in ThreatConnect, and Actor or Actor Profile tags on ingested Events from Flashpoint Ignite are created as Intrusion Set Groups in ThreatConnect. Events with these tags typically describe an activity by malware or a threat actor that leverages indicators.
  • Reports are created as Report Groups in ThreatConnect. In addition, Actor Profile tags on ingested Reports from Flashpoint Ignite are created as Intrusion Set Groups in ThreatConnect.

Vulnerabilities are created as Threat Groups in ThreatConnect. Each CVE® belonging to a Vulnerability is created as a Vulnerability Group in ThreatConnect if its CVE-ID has a Common Vulnerability Scoring System (CVSS) score provided by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD).

Dependencies

ThreatConnect Dependencies

  • ThreatConnect instance with version 7.2.0 or newer installed

Flashpoint Ignite Dependencies

  • Active Flashpoint Ignite token
  • Subscription to the Cyber Threat Intelligence (CTI) product within the Flashpoint Ignite platform
  • To ingest premium Vulnerabilities, you must have the Vulnerability Intelligence Premium plan. See https://docs.flashpoint.io/flashpoint/docs/vulnerability-intelligence for more information (must have a valid Flashpoint account to view this documentation).
  • For each Alert Rule you want to ingest into ThreatConnect, you must ensure that the Flashpoint Ignite API user associated with the Flashpoint Ignite token is subscribed to the Alert Rule prior to ingestion.
    Hint
    You can fine-tune the volume of data ingested into ThreatConnect from an Alert Rule by editing the Alert Rule in Flashpoint Ignite.

Application Setup and Configuration

Important
Follow the instructions in the “Update the Flashpoint Ignite Threat Intelligence Engine App” section if you are updating a previously installed version of the Flashpoint Ignite Threat Intelligence Engine App.

The Flashpoint Ignite Threat Intelligence Engine App leverages the Feed Deployer to create a Source for data ingestion from Flashpoint Ignite in an Organization and to configure the corresponding Service’s ingestion and authentication parameters. After you install the Flashpoint Ignite Threat Intelligence Engine App on your ThreatConnect instance, you can deploy it to any Organization. It must be deployed separately for each Organization in which you want to create a Source for data ingestion and a corresponding Service.

Install the Flashpoint Ignite Threat Intelligence Engine App

Follow these steps to install the Flashpoint Ignite Threat Intelligence Engine App on your ThreatConnect instance:

  1. Log into ThreatConnect with a System Administrator account.
  2. From the SettingsSettings iconmenu on the top navigation bar, select TC Exchange Settings.
  3. Select the Catalog tab on the TC Exchange™ Settings screen.
  4. Locate the Flashpoint Ignite Threat Intelligence Engine App on the Catalog tab.
  5. Click InstallPlus icon_Dark bluein the Options column to install the App.
  6. Click INSTALL in the App’s Release Notes window.
  7. After you install the Flashpoint Ignite Threat Intelligence Engine App, the Feed Deployer will open automatically. Follow the procedure in the “Deploy the Flashpoint Ignite Threat Intelligence App to an Organization” section to deploy the Flashpoint Ignite Threat Intelligence Engine App to a Source in an Organization and configure the corresponding Service.

Deploy the Flashpoint Ignite Threat Intelligence App to an Organization

Follow these steps to deploy the Flashpoint Ignite Threat Intelligence Engine App to an Organization:

Note
Skip to the fourth step in the procedure if you just installed the Flashpoint Ignite Threat Intelligence Engine App and are already viewing the Feed Deployer window.
  1. Log into ThreatConnect with a System Administrator account.
  2. From the SettingsSettings iconmenu on the top navigation bar, select TC Exchange Settings.
  3. Locate the Flashpoint Ignite Threat Intelligence Engine App on the Installed tab. Then select Deploy from the Options dropdown.
  4. Follow the instructions in Table 1 to fill out the fields in the Feed Deployer window for a deployment of the Flashpoint Ignite Threat Intelligence Engine App.

     

    NameDescriptionRequired?
    Source Tab
    Sources to CreateEnter the name of the Source for the feed.
    Note
    Unless you are redeploying the feed to an existing Source in an Organization, the name of the Source must be unique on your ThreatConnect instance. It is recommended to add the Organization’s name to the end of the default Source name (e.g., Flashpoint Ignite Threat Intelligence Engine – Demo Organization) for easy identification of the Source’s owner.
    Required
    OwnerSelect the Organization in which the Source will be created.Required
    Activate DeprecationSelect this checkbox to allow confidence deprecation rules to be created and applied to Indicators in the Source.Optional
    Create AttributesSelect this checkbox to allow custom Attribute Types for the Flashpoint Ignite Threat Intelligence Engine App to be created on the System level of your ThreatConnect instance.
    Important
    It is recommended that you keep this checkbox selected. If you deselect it, data from the Flashpoint Ignite Threat Intelligence Engine App mapped to those Attribute Types will not be ingested.
    Optional
    Parameters Tab
    Launch ServerSelect tc-job as the launch server for the Feed API Service.Required
    Flashpoint TypesSelect the types of Flashpoint objects to ingest. Available options include the following:
    • Event
    • FP Attribute
    • Report
    • Vulnerability
    Note
    Vulnerability objects are available only for Flashpoint users who have the Vulnerability Intelligence Premium plan.
    Required
    Alert SourcesSelect the sources of Flashpoint Alerts to ingest. Available options include the following:
    • Media
    • News
    • Marketplaces
    • Communities
    • GitHub
    • GitLab
    • Bitbucket
    Optional
    Advanced Settings

    Use this setting to set default values for the following items for the ThreatConnect objects to which Flashpoint data will be mapped:

    • Confidence Rating (default_confidence)
    • Threat Rating (default_rating)
    • Security Label(default_label)

    If specifying multiple items, separate each one with a pipe character (|).

    Example
    • default_label=TLP:AMBER
    • default_rating=5|default_label=TLP:WHITE|default_confidence=95
    Note
    The values entered in the Advanced Settings field are also used in ad-hoc Job requests.
    Optional
    Variables Tab
    Flashpoint Ignite Bearer Token*Enter the Flashpoint Ignite bearer token.
    Note
    You must enter the actual Flashpoint bearer token value instead of populating this parameter with a ThreatConnect variable.
    Required
    Confirm Tab
    Run Feeds after deploymentSelect this checkbox to run the Flashpoint Ignite Threat Intelligence Engine Service immediately after you click DEPLOY on the Feed Deployer window.Optional
    Confirm Deployment Over Existing SourceThis checkbox and a warning message are displayed on the Confirm tab if the Source name entered on the Source tab is already used by a Source owned by the selected Organization. To confirm redeploying the App to the existing Source, select the checkbox. This will activate the DEPLOY button. Otherwise, you must return to the Source tab and either change the Source name or select a different Organization.
    Warning
    When you redeploy a Feed API Service to a Source, existing data in the Source may be overwritten. Redeployment will also create a new Service for the Feed API Service App. It is recommended that you delete the previous Service for the Feed API Service App after the new one is created.
    Optional
  5. Click DEPLOY on the Confirm tab of the Feed Deployer window to deploy the Flashpoint Ignite Threat Intelligence Engine App in the Organization, which will create a Source for the feed in the Organization and a corresponding Feed API Service.

Update the Flashpoint Ignite Threat Intelligence Engine App

If you have previously deployed the Flashpoint Ignite Threat Intelligence Engine App to an Organization on your ThreatConnect instance, follow these steps to update the Flashpoint Ignite Threat Intelligence Engine App and the Attribute Types used for data ingestion into ThreatConnect:

Note
When ThreatConnect 7.12 is released, Steps 1–8 will not be necessary. Instead, custom Attribute Types will be automatically updated when an App is updated on the TC Exchange Settings screen.
  1. Download the attributes.json file provided for the Flashpoint Ignite Threat Intelligence Engine App on the ThreatConnect Developer Hub.
  2. Log into ThreatConnect with a System Administrator account.
  3. From the SettingsSettings iconmenu on the top navigation bar, select System Settings.
  4. Select the Attribute Types tab.
  5. Click UPLOAD.
  6. Click + SELECT FILE on the Upload Attributes window.
  7.  Locate and select the attributes.json file you downloaded in Step 1.
  8. Click SAVE to save the Attribute Types.
  9. From the SettingsSettings iconmenu on the top navigation bar, select TC Exchange Settings.
  10. Select the Updates tab.
  11. Locate the Flashpoint Ignite Threat Intelligence Engine App on the Updates tab.
  12. Click Update NowUpdate iconin the Options column to update the App.
  13. From the Automation & Feeds menu on the top navigation bar, select Services.
  14. Toggle the slider for each Flashpoint Ignite Threat Intelligence Engine Service off and then on to restart the Service.

Flashpoint Ignite Threat Intelligence Engine UI

After installing the Flashpoint Ignite Threat Intelligence Engine App and deploying it to an Organization, you can access the Flashpoint Ignite Threat Intelligence Engine user interface (UI), where you can manage data ingestion from Flashpoint Ignite into the Source created in the Organization.

Follow these steps to access the Flashpoint Ignite Threat Intelligence Engine UI:

  1. Log into ThreatConnect with a System Administrator account or a user account in the Organization with an Organization role of Organization Administrator.
  2. From the Automation & Feeds dropdown on the top navigation bar, select Services.
  3. Locate the row for the Flashpoint Ignite Threat Intelligence Engine Feed Service.
    Hint
    Select Feed Service from the Service Type dropdown at the upper right to filter the screen to show only Feed API Services.
  4. Turn on the slider in the Enable column if the Service is not already enabled.
  5. Click the link in the Service’s API Path field to open the Flashpoint Ignite Threat Intelligence Engine UI.

The following screens are available in the Flashpoint Ignite Threat Intelligence Engine UI:

Dashboard

The Dashboard screen (Figure 1) provides an overview of the total number of Alerts (Event, Document) Attributes (Address, File, Host, URL), Events (Event, Malware, Intrusion Set), Reports (Report), and Vulnerabilities (Threat, Vulnerability) ingested from Flashpoint Ignite.

Figure 1_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

 

Jobs

The Jobs screen (Figure 2) breaks down the ingestion of Flashpoint Ignite data into manageable Job-like tasks, displaying all processes that are pending, in progress, complete, and failed. The menu in a Job’s row provides the following options:

  • Details: View details for the Job, such as download, convert, and upload start and complete times and counts of downloaded and batched Groups and Indicators.
  • Download Files: Download metadata files for all Jobs and data (convert, download, and upload) files for completed Jobs.
  • Batch Errors: View errors that have occurred for the Job on the Batch Errors screen.

Figure 2_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

 

You can filter Flashpoint Ignite Threat Intelligence Engine App Jobs by the following elements:

  • Job ID: Enter text into this box to search for a Job by its Job ID.
  • Job Type: Select Job types to display on the Jobs screen.
  • Status: Select Job statuses to display on the Jobs screen.

Add a Job

You can add ad-hoc Jobs on the Jobs screen. Follow these steps to create a request for an ad-hoc Job for the Flashpoint Ignite Threat Intelligence Engine Service:

  1. Click Add Job (Figure 2).
  2. Fill out the fields on the Add Job drawer (Figure 3) as follows:
    Figure 3_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

     

    • Updated After: Select the date and time that Flashpoint Ignite data must be updated after in order to be ingested.
    • Updated Before: Select the date and time that Flashpoint Ignite data must be updated before in order to be ingested.
    • Flashpoint Types: Select the types of Flashpoint Ignite object types to include in the ad-hoc Job.
    • Alert Sources: Select the Flashpoint Ignite Alert sources to include in the ad-hoc Job.
  3. Click Submit to submit the request for the ad-hoc Job.

Tasks

The Tasks screen (Figure 4) displays all Tasks that may be part of a Job, including each step of the download, convert, and upload processes, as well as Tasks for the Flashpoint Ignite Threat Intelligence Engine Service, such as Monitor, Scheduler, and Cleaner. The current status (Idle, Paused, or Running), name, description, and heartbeat timeout length, in minutes, are displayed for each Task. The menu in a Task’s row provides the following options, depending on the Task’s status:

  • Run (idle and paused Tasks only)
  • Pause (idle and running Tasks only)
  • Resume (paused Tasks only)
  • Kill (running Tasks only)

Under the table is a dashboard where you can view runtime analytics.

Figure 4_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

 

Download

The Download screen (Figure 5) lets you download JavaScript® Object Notation (JSON) data for Flashpoint Ignite objects and then upload the data into ThreatConnect.

Figure 5_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

 

Follow these steps to download JSON data for a Flashpoint Ignite object on the Download screen and then upload the data into ThreatConnect:

  1. External ID: Enter the Flashpoint ID (FPID) of the object to download.
  2. Type: Select the Flashpoint Ignite object type to download:
    • Vulnerability: Download a Flashpoint Ignite Vulnerability. If you upload the JSON data, a Threat Group will be created in ThreatConnect. If the Vulnerability includes CVEs with a CVSS scores, those CVEs will be created as Vulnerability Groups in ThreatConnect.
      • Report: Download a Flashpoint Ignite Report. If you upload the JSON data, a Report Group will be created in ThreatConnect.
      • Event: Download a Flashpoint Ignite Event. If you upload the JSON data, an Event Group will be created in ThreatConnect. If the Flashpoint Ignite Event has Attributes, then Address, File, Host, and/or URL Indicators will be created in ThreatConnect as well. In addition, if the Event has a Malware tag in Flashpoint Ignite, a Malware Group will be created in ThreatConnect. If the Event has an Actor or Actor Profile tag in Flashpoint Ignite, an Intrusion Set Group will be created in ThreatConnect.
      • Notification: Download a Flashpoint Ignite Alert. If you upload the JSON data, a Document Group or Event Group will be created in ThreatConnect.
  3. Click Download. The JSON data will be displayed in two columns: Results (raw JSON data) and Converted (JSON data in ThreatConnect batch format) (Figure 6).

    Figure 6_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

     

  4. Click Upload to submit the converted threat intelligence data via the ThreatConnect Batch API.

Batch Errors

The Batch Errors screen (Figure 7) displays an overview of the batch error types that have occurred for Job requests. You can enter keywords to filter by Job ID.

Figure 7_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

 

Select an error type to open a drawer containing a table with details on all batch errors of that type (Figure 8). You can enter keywords to filter by reason for error.

Figure 8_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

 

Attachment Status

The Attachment Status screen (Figure 9) displays a table with details on ThreatConnect's attempts to download Report attachments from Flashpoint Ignite. You can filter the table by Flashpoint Ignite Group ID, which can be useful if you do not see a Flashpoint Ignite attachment in ThreatConnect as expected, or by status.

Figure 9_Flashpoint Ignite Threat Intelligence Engine Integration User Guide_Software Version 1.0.5

 

Data Mappings

The data mappings in Table 2 through Table 13 illustrate how data are mapped from Flashpoint Ignite API endpoints into the ThreatConnect data model.

Attribute (From Events Endpoint)

ThreatConnect object type: Indicator (Address, File, Host, or URL)

 

Flashpoint Ignite API FieldThreatConnect Field
Event.Attribute.categoryAttribute: "Category"
Event.Attribute.fpidAttribute: "External ID"
Event.Attribute.hrefAttribute: "Source"
Event.Attribute.typeIndicator Type
Event.Attribute.value.XIndicator Value [See the Table 3 in the “Value (From Events Endpoint)” section for details on how different Flashpoint data types are mapped in ThreatConnect]

Value (From Events Endpoint)

ThreatConnect object type: Varies

 

Flashpoint Data TypeThreatConnect Object
ASASN Indicator
bteEvent Group
  • Attribute: "Bitcoin Address"
domainHost Indicator
email-dstEmail Address Indicator
  • Tag: "Destination"
email-srcEmail Address Indicator
  • Tag: "Source"
email-subjectEmail Subject Indicator
filenameEvent Group
  • Attribute: "File Name"
github-usernameEvent Group
  • Attribute: "GitHub"
hostnameHost Group
ip-dstAddress Indicator
  • Tag: "Destination"
ip-dst|portAddress Indicator
  • Tag: "Destination"
  • Attribute: "Port"
ip-srcAddress Indicator
  • Tag: "Source"
linkEvent Group
  • Attribute: "External References"
md5File Indicator
mutexMutex Indicator
otherEvent Group
  • Attribute: "Additional Analysis and Context"
regkeyRegistry Key Indicator
regkey|valueRegistry Key Indicator
sha1File Indicator
sha256File Indicator 
threat-actorIntrusion Set Group
twitter-idEvent Group
  • Attribute: "Social Media: Twitter"
urlURL Indicator
user-agentUser Agent Indicator
whois-registrant-emailEmail Address Indicator
  • Tag: "WHOIS"

Event

ThreatConnect object type: Event Group

 

Flashpoint Ignite API FieldThreatConnect Field
Event.Tag.nameTag
  • If the Tag type is Actor or Actor Profile, the Tag is also mapped to an Intrusion Set Group that is associated to the Event Group
  • If the Tag type is Malware, the Tag is also mapped to a Malware Group that is associated to the Event Group
Event.dateEvent Date
Event.infoName/Summary
Event.reportAssociated Report Group
Event.publish_timestampAttribute: "Publish Date"
Event.timestampAttribute: "External Date Created"
Event.attack_idsATT&CK® Tag
Event.fpidAttribute: "External ID"
hrefAttribute: "Source"
Event.Attribute.reports.htmlAssociated Report Group
  • Attribute: "Source"
reports.htmlAssociated Report Group
malware_descriptionAssociated Malware Group
  • Attribute: "Description" (default)
actor_descriptionAssociated Intrusion Set Group
  • Attribute: "Description" (default)

Intelligence Report

ThreatConnect object type: Report Group

 

Flashpoint Ignite API FieldThreatConnect Field
data.idAttribute: "External ID"
data.actorsTag: "Intrusion Set: <Intrusion Set Name>"
data.titleName/Summary
data.summaryAttribute: "Description" (default)
data.tagsTag
  • If the Tag type is Actor Profile, the Tag is also mapped to an Intrusion Set Group that is associated to the Report Group
data.bodyHTML File Attachment
data.ingested_atAttribute: "Ingestion Date"
data.posted_atAttribute: "Publish Date"
data.platform_urlAttribute: "Source"
data.notified_atAttribute: "First Seen"
data.updated_atAttribute: "External Date Last Modified"
data.published_statusAttribute: "Publish Status"

Vulnerability Intelligence (Premium)

ThreatConnect object type: Threat Group

 

Flashpoint Ignite API FieldThreatConnect Field
idAttribute: "External ID"
titleName/Summary
descriptionAttribute: "Description" (default)
solutionAttribute: "Mitigations"
technical_descriptionAttribute: "Analyst Notes"
timelines.disclosed_at
  • First Seen
  • Attribute: "Timeline" (Disclosure Date row)
timelines.published_atAttribute: "Timeline" (Published Date row)
timelines.last_modified_at
  • External Date Last Modified
  • Attribute: "Timeline" (Last Update row)
timelines.exploit_published_atAttribute: "Timeline" (Exploit Publish Date row)
timelines.discovered_at
  • External Date Added
  • Attribute: "Timeline" (Date of Discovery row)
timelines.vendor_informed_atAttribute: "Timeline" (Vendor Inform Date row)
timelines.vendor_acknowledged_atAttribute: "Timeline" (Vendor Acknowledge Date row)
timelines.third_party_solution_provided_atAttribute: "Timeline" (Third Party Solution Date row)
timelines.solution_provided_atAttribute: "Timeline" (Solution Date row)
scores.severityAttribute: "Threat Level"
scores.ransomware_scoreAttribute: "Ransomware Score"
vuln_statusAttribute: "Status"
exploits.valueAttribute: "Exploits" (Value column)
exploits.typeAttribute: "Exploits" (Type column)
cwes.cwe_idTag
ext_references.valueAttribute: "External Details" (Value column)
ext_references.typeAttribute: "External Details" (Type column)
ext_references.created_atAttribute: "External Details" (External Date Created column)
classifications.longnameAttribute: "Classification" (Name column)
classifications.descriptionAttribute: "Classification" (Description column)
cvss_v2s.access_vectorAttribute: "CVSS Score Flashpoint" (Access Vector column)
cvss_v2s.access_complexityAttribute: "CVSS Score Flashpoint" (Access Complexity column)
cvss_v2s.authenticationAttribute: "CVSS Score Flashpoint" (Authentication column)
cvss_v2s.confidentiality_impactAttribute: "CVSS Score Flashpoint" (Confidentiality Impact column)
cvss_v2s.integrity_impactAttribute: "CVSS Score Flashpoint" (Integrity Impact column)
cvss_v2s.availability_impactAttribute: "CVSS Score Flashpoint" (Availability Impact column)
cvss_v2s.sourceAttribute: "CVSS Score Flashpoint" (Source column)
cvss_v2s.generated_atAttribute: "CVSS Score Flashpoint" (Generated At column)
cvss_v2s.scoreAttribute: "CVSS Score Flashpoint" (Score column)
cvss_v2s.calculated_cvss_base_scoreAttribute: "CVSS Score Flashpoint" (Calculated CVSS Base Score column)
cvss_v3s.attack_vectorAttribute: "CVSS Score Flashpoint" (Attack Vector row)
cvss_v3s.attack_complexityAttribute: "CVSS Score Flashpoint" (Attack Complexity row)
cvss_v3s.privileges_requiredAttribute: "CVSS Score Flashpoint" (Privileges Required row)
cvss_v3s.user_interactionAttribute: "CVSS Score Flashpoint" (User Interaction row)
cvss_v3s.scopeAttribute: "CVSS Score Flashpoint" (Scope row)
cvss_v3s.confidentiality_impactAttribute: "CVSS Score Flashpoint" (Confidentiality Impact row)
cvss_v3s.integrity_impactAttribute: "CVSS Score Flashpoint" (Integrity Impact row)
cvss_v3s.availability_impactAttribute: "CVSS Score Flashpoint" (Availability Impact row)
cvss_v3s.sourceAttribute: "CVSS Score Flashpoint" (Source row)
cvss_v3s.generated_atAttribute: "CVSS Score Flashpoint" (Generated At row)
cvss_v3s.scoreAttribute: "CVSS Score Flashpoint" (Score row)
cvss_v3s.calculated_cvss_base_scoreAttribute: "CVSS Score Flashpoint" (Calculated CVSSBase Score row)
cvss_v3s.vector_stringAttribute: "CVSS Score Flashpoint" (Vector String row)
cvss_v3s.versionAttribute: "CVSS Score Flashpoint" (Version row)
cvss_v3s.remediation_levelAttribute: "CVSS Score Flashpoint" (Remediation Level row)
cvss_v3s.report_confidenceAttribute: "CVSS Score Flashpoint" (Report Confidence row)
cvss_v3s.exploit_code_maturityAttribute: "CVSS Score Flashpoint" (Exploit Code Maturity row)
cvss_v3s.temporal_scoreAttribute: "CVSS Score Flashpoint" (Temporal Score row)
cvss_v3s.updated_atAttribute: "CVSS Score Flashpoint" (Updated At row)
cvss_v4s.scoreAttribute: "CVSS Score Flashpoint" (Score row)
cvss_v4s.threat_scoreAttribute: "CVSS Score Flashpoint" (Threat Score row)
cvss_v4s.sourceAttribute: "CVSS Score Flashpoint" (Source row)
cvss_v4s.generated_atAttribute: "CVSS Score Flashpoint" (Generated At row)
cvss_v4s.updated_atAttribute: "CVSS Score Flashpoint" (Updated At row)
cvss_v4s.vector_stringAttribute: "CVSS Score Flashpoint" (Vector String row)
cvss_v4s.versionAttribute: "CVSS Score Flashpoint" (Version row)
cvss_v4s.attack_vectorAttribute: "CVSS Score Flashpoint" (Attack Vector row)
cvss_v4s.attack_complexityAttribute: "CVSS Score Flashpoint" (Attack Complexity row)
cvss_v4s.attack_requirementsAttribute: "CVSS Score Flashpoint" (Attack Requirements row)
cvss_v4s.privileges_requiredAttribute: "CVSS Score Flashpoint" (Privileges Required row)
cvss_v4s.user_interactionAttribute: "CVSS Score Flashpoint" (User Interaction row)
cvss_v4s.exploit_maturityAttribute: "CVSS Score Flashpoint" (Exploit Maturity row)
cvss_v4s.vulnerable_system_confidentiality_impactAttribute: "CVSS Score Flashpoint" (VS Confidentiality Impact row)
cvss_v4s.vulnerable_system_integrity_impactAttribute: "CVSS Score Flashpoint" (VS Integrity Impact row)
cvss_v4s.vulnerable_system_availability_impactAttribute: "CVSS Score Flashpoint" (VS Availability Impact row)
cvss_v4s.subsequent_system_confidentiality_impactAttribute: "CVSS Score Flashpoint" (SS Confidentiality Impact row)
cvss_v4s.subsequent_system_integrity_impactAttribute: "CVSS Score Flashpoint" (SS Integrity Impact row)
cvss_v4s.subsequent_system_availability_impactAttribute: "CVSS Score Flashpoint" (SS Availability Impact row)
tagsTag
products.name
  • Attribute: "Vulnerable Product" (Product column)
  • Tag
products.versions.affectedAttribute: "Vulnerable CPE" (Affected column)
products.versions.cpes.nameAttribute: "Vulnerable CPE" (CPE column)
products.versions.cpes.sourceAttribute: "Vulnerable CPE" (Source column)
vendors.name
  • Attribute: "Vulnerable Product" (Vendor column)
  • Tag

ThreatConnect object type: Vulnerability Group

 

Flashpoint Ignite API FieldThreatConnect Field
nvd_additional_information.cve_id
  • Attribute: "External ID" (default)
  • Name/Summary
  • Source: "https://nvd.nist.gov/vuln/detail/<CVE ID number>"
nvd_additional_information.summaryAttribute: "Description" (default)
nvd_additional_information.cwes.cwe_idTag: "Vulnerability: <CWE ID number>"
scores.epss_scoreAttribute: "EPSS Score"
scores.epss_v1_scoreAttribute: "EPSS v1 Score"
scores.severityAttribute: "Threat Level"
scores.ransomware_scoreAttribute: "Ransomware Score"
scores.social_risk_scores.cve_idAttribute: "Metrics" (CVE ID row)
scores.social_risk_scores.numeric_scoreAttribute: "Metrics" (Social Risk Numerical Score row)
scores.social_risk_scores.categorical_scoreAttribute: "Metrics" (Social Risk Categorical Score row)
scores.social_risk_scores.score_dateAttribute: "Metrics" (Score Date row)
scores.social_risk_scores.todays_tweetsAttribute: "Metrics" (Number of Today's Tweets row)
scores.social_risk_scores.total_tweetsAttribute: "Metrics" (Total Number of Tweets row)
scores.social_risk_scores.unique_usersAttribute: "Metrics" (Number of Unique Users row)
nvd_additional_information.cvss_v2s.access_vector
  • Attribute: "CVSS v2 Access Vector"
  • Attribute: "Description" (Access Vector row)
nvd_additional_information.cvss_v2s.access_complexity
  • Attribute: "CVSS v2 Access Complexity"
  • Attribute: "Description" (Access Complexity row)
nvd_additional_information.cvss_v2s.authentication
  • Attribute: "CVSS v2 Authentication"
  • Attribute: "Description" (Authentication row)
nvd_additional_information.cvss_v2s.confidentiality_impact
  • Attribute: "CVSS v2 Confidentiality Impact"
  • Attribute: "Description" (Confidentiality Impact row)
nvd_additional_information.cvss_v2s.integrity_impact
  • Attribute: "CVSS v2 Integrity Impact"
  • Attribute: "Description" (Integrity Impact row)
nvd_additional_information.cvss_v2s.availability_impact
  • Attribute: "CVSS v2 Availability Impact"
  • Attribute: "Description" (Availability Impact row)
nvd_additional_information.cvss_v2s.score
  • Attribute: "CVSS Score v2"
  • Attribute: "Description" (Score row)
nvd_additional_information.cvss_v3s.attack_vector
  • Attribute: "CVSS v3 Attack Vector"
  • Attribute: "Description" (Attack Vector row)
nvd_additional_information.cvss_v3s.attack_complexity
  • Attribute: "CVSS v3 Attack Complexity"
  • Attribute: "Description" (Attack Complexity row)
nvd_additional_information.cvss_v3s.privileges_required
  • Attribute: "CVSS v3 Privileges Required"
  • Attribute: "Description" (Privileges Required row)
nvd_additional_information.cvss_v3s.user_interaction
  • Attribute: "CVSS v3 User Interaction"
  • Attribute: "Description" (User Interaction row)
nvd_additional_information.cvss_v3s.scope
  • Attribute: "CVSS v3 Scope"
  • Attribute: "Description" (Scope row)
nvd_additional_information.cvss_v3s.confidentiality_impact
  • Attribute: "CVSS v3 Confidentiality Impact"
  • Attribute: "Description" (Confidentiality Impact row)
nvd_additional_information.cvss_v3s.integrity_impact
  • Attribute: "CVSS v3 Integrity Impact"
  • Attribute: "Description" (Integrity Impact row)
nvd_additional_information.cvss_v3s.availability_impact
  • Attribute: "CVSS v3 Availability Impact"
  • Attribute: "Description" (Availability Impact row)
nvd_additional_information.cvss_v3s.score
  • Attribute: "CVSS Score v3"
  • Attribute: "Description" (Score row)
nvd_additional_information.cvss_v3s.vector_string
  • Attribute: "CVSS v3 Vector String"
  • Attribute: "Description" (Vector String row)
nvd_additional_information.cvss_v3s.version
  • Attribute: "CVSS Version"
  • Attribute: "Description" (Version row)

Alerts - Communities

ThreatConnect object type: Event Group

 

Flashpoint Ignite API FieldThreatConnect Field
reason.nameAttribute: "Alert Rule"
reason.idAttribute: "Alert Rule ID"
resource.id
  • Attribute: "Description" (default) with additional custom mapping
  • Attribute: "Source" (default) with additional custom mapping
  • Attribute: "Additional Analysis and Context" with additional custom mapping
  • Name/Summary with additional custom mapping
  • Status with additional custom mapping
idAttribute: "External ID"
created_at
  • Event Date
  • External Date Added
resource.basetypes[]Tag
tagsTag
reason.details.sources[]Tag
sourceTag
data_typeTag
reason.originTag
N/ATag: "Source: Flashpoint Alert"

Alerts - Marketplace

ThreatConnect object type: Event Group

 

Flashpoint Ignite API FieldThreatConnect Field
reason.nameAttribute: "Alert Rule"
reason.idAttribute: "Alert Rule ID"
resource.id
  • Attribute: "Description" (default) with additional custom mapping
  • Attribute: "Source" (default) with additional custom mapping
  • Attribute: "Additional Analysis and Context" with additional custom mapping
  • Name/Summary with additional custom mapping
  • Status with additional custom mapping
idAttribute: "External ID"
created_at
  • Event Date
  • External Date Added
resource.basetypes[]Tag
tagsTag
reason.details.sources[]Tag
sourceTag
data_typeTag
reason.originTag
resource.site.titleTag
N/ATag: "Source: Flashpoint Alert"

Alerts - Media

ThreatConnect object type: Document Group

 

Flashpoint Ignite API FieldThreatConnect Field
reason.nameAttribute: "Alert Rule"
reason.idAttribute: "Alert Rule ID"
resource.id
  • Attribute: "Description" (default) with additional custom mapping
  • Attribute: "Source" (default) with additional custom mapping
  • Attribute: "Additional Analysis and Context" with additional custom mapping
  • Name/Summary with additional custom mapping
  • Status with additional custom mapping
idAttribute: "External ID"
created_at
  • Event Date
  • External Date Added
resource.basetypes[]Tag
tagsTag
reason.details.sources[]Tag
sourceTag
data_typeTag
reason.originTag
resource.site.titleTag
N/ATag: "Source: Flashpoint Alert"

Image Files From Alerts - Media

ThreatConnect object type: Document Group

 

Flashpoint Ignite API FieldThreatConnect Field
media_v2.sha1Attribute: "Description" (default) with additional custom mapping
media_v2.image_enrichment.enrichments
media_v2.phashAttribute: "Source" (default) with additional custom mapping
file_nameFile Name with additional custom mapping
sha1Name/Summary with additional custom mapping
N/ATag: "Source: Flashpoint Alert"
N/ATag: "Alert Image Pending"
Note
This Tag is added while the file is uploading. After the file has uploaded, the Tag is removed.
file_typeTag
xidAttribute: "External ID"

Alerts - News

ThreatConnect object type: Event Group

 

Flashpoint Ignite API FieldThreatConnect Field
reason.nameAttribute: "Alert Rule"
reason.idAttribute: "Alert Rule ID"
resource.id
  • Attribute: "Description" (default) with additional custom mapping
  • Attribute: "Source" (default) with additional custom mapping
  • Attribute: "Additional Analysis and Context" with additional custom mapping
  • Name/Summary with additional custom mapping
  • Status with additional custom mapping
idAttribute: "External ID"
created_at
  • Event Date
  • External Date Added
resource.basetypes[]Tag
reason.details.sources[]Tag
sourceTag
tagsTag
N/ATag: "Source: Flashpoint Alert"

Alerts - Code Repositories

ThreatConnect object type: Event Group

 

Flashpoint Ignite API FieldThreatConnect Field
reason.nameAttribute: "Alert Rule"
reason.idAttribute: "Alert Rule ID"
resource.id
  • Attribute: "Description" (default) with additional custom mapping
  • Name/Summary with additional custom mapping
  • Status with additional custom mapping
resource.urlAttribute: "Source" (default) with additional custom mapping
idAttribute: "External ID"
created_at
  • Event Date
  • External Date Added
resource.basetypes[]Tag
reason.details.sources[]Tag
sourceTag
tagsTag
data_typeTag
reason.originTag
resource.repoTag
N/ATag: "Source: Flashpoint Alert"

Frequently Asked Questions (FAQ)

How are Flashpoint Ignite Vulnerability objects mapped to ThreatConnect objects?

Under Flashpoint Ignite’s Vulnerability structure, a single CVE-ID can be associated with multiple Flashpoint IDs (FPIDs), or multiple CVE-IDs can be associated with a single FPID. In version 1.0.0 of the Flashpoint Ignite Threat Intelligence Engine App, Flashpoint Ignite Vulnerabilities are mapped to Threat Groups in ThreatConnect. In version 1.0.1 and later versions, each CVE-ID representing a Flashpoint Ignite Vulnerability is mapped to a Vulnerability Group in ThreatConnect, and Common Weakness Enumeration (CWE™) IDs are mapped to Tags that are applied to Vulnerability and Threat Groups in ThreatConnect that correspond to Flashpoint Ignite Vulnerabilities.


Which Flashpoint Ignite data objects are modeled as Intrusion Sets in ThreatConnect?

The Flashpoint Ignite Threat Intelligence Engine App ingests and models the following Flashpoint Ignite data objects as Intrusion Set Groups in ThreatConnect:

  • Actor descriptions from the Flashpoint Events API endpoint
  • Actor Tags
  • Actor Profile Tags applied to Flashpoint Reports

How can I ingest more historical data from Flashpoint Ignite?

You can ingest more historical data from Flashpoint Ignite via the Add Job button on the Jobs screen of the Flashpoint Ignite Threat Intelligence Engine UI (Figure 2). When adding a Job, select an appropriate date range from which to ingest historical Flashpoint Ignite data. For Reports, FP Attributes, and Events, it is recommended to use an ingestion date range of 90 days or fewer. For Vulnerabilities, any ad-hoc Jobs with an ingestion date range greater than 2 days may interrupt the daily scheduled Job runs if the daily limit of 5000 calls per day to the Vulnerability Flashpoint API endpoints is reached.


The Service for the Flashpoint Ignite Threat Intelligence Engine App is not starting, and I am getting an error saying, “Required attributes are missing. Shutting down Flashpoint Ignite app.” What should I do next?

Follow Steps 1–8 in the “Update the Flashpoint Ignite Threat Intelligence Engine App” section to retrieve the attributes.json file containing the most up-to-date Attribute Types for the Flashpoint Ignite Threat Intelligence Engine App and add those Attribute Types on the System level on your ThreatConnect instance.


Why do I not see any Vulnerability data from Flashpoint Ignite in the Source for the Flashpoint Ignite Threat Intelligence Engine App in ThreatConnect?

As of March 2025, Flashpoint Ignite does not support API access to Vulnerability data for Essential-tier membership. Vulnerability data are still available for users with the Vulnerability Intelligence Premium plan.


Why do I not see any Alert data from Flashpoint Ignite in the Source for the Flashpoint Ignite Threat Intelligence Engine App in ThreatConnect?

Double check that the Flashpoint Ignite API user associated with the Flashpoint Ignite token provided in the Flashpoint Ignite Threat Intelligence Engine App’s configuration is subscribed to each Alert Rule you want to ingest into ThreatConnect. See the “Flashpoint Ignite Dependencies” section for more information.


ThreatConnect® is a registered trademark, and TC Exchange™ is a trademark, of ThreatConnect, Inc.
Flashpoint® is a registered trademark of EJ2 Communications, Inc.
JavaScript® is a registered trademark of Oracle Corporation.
CVE® (Common Vulnerabilities and Exposures), MITRE ATT&CK®, and ATT&CK® are registered trademarks, and CWE™ (Common Weakness Enumeration) is a trademark, of The MITRE Corporation.

30089-04 EN Rev. A


Was this article helpful?