feat: add SOCRadar TAXII Feed Import & IoC Enrichment modules#770
feat: add SOCRadar TAXII Feed Import & IoC Enrichment modules#770
Conversation
- Import module (socradar_taxii_feed.py): Fetches STIX 2.1 indicators from SOCRadar TAXII 2.1 server with MITRE ATT&CK, malware family, confidence, geo, and feed source tagging. Handles pagination via more+next cursor. 60+ malware family detection. - Expansion module (socradar_lookup.py): Enriches MISP attributes via SOCRadar IoC Enrichment API. Two modes: full (categorization, classifications, history, optional AI) and stix (fast STIX output). Supports IP, domain, URL, hash, email. Signed-off-by: Burak Goger <burak.goger@socradar.io>
|
Hi MISP team,
We're aware of the existing generic TAXII 2.1 import module. Our import module adds SOCRadar-specific value by parsing the The expansion module uses a separate REST API ( Both modules have been tested against production data. Happy to address any feedback! Best, |
|
Thanks a lot. This looks great. Can you lint the files to be sure that the tests are passing? |
- Collection UUID empty → lists all available collections with names and UUIDs - max_indicators config (default 500) prevents timeout on large collections - Better user guidance in field descriptions - Import summary shows count and limit info
|
Hi @adulau , thanks for the quick review and support! Both files are now linted with black, isort, and flake8. We tested both modules on a live MISP instance: Import module — Successfully fetches indicators from SOCRadar TAXII 2.1 server via
The module also supports collection auto-discovery — when no collection UUID is provided, it returns a list of all available collections with their UUIDs and feed names. Expansion module — Successfully enriches attributes via SOCRadar IoC Enrichment REST API ( Let us know if you need any changes! |
|
Great stuff. I merged it but I have some open questions about the TAXII->MISP connectors:
Thanks a lot. |
Add SOCRadar TAXII Feed Import & IoC Enrichment Expansion Modules
Summary
This PR adds two new modules for SOCRadar threat intelligence integration:
import_mod/socradar_taxii_feed.py) — Import enriched threat indicators from SOCRadar's TAXII 2.1 server into MISP eventsexpansion/socradar_lookup.py) — Enrich MISP attributes by querying SOCRadar's IoC Enrichment REST APIWhat is SOCRadar?
SOCRadar is an Extended Threat Intelligence (XTI) platform that aggregates indicators from 100+ sources . It provides:
Import Module —
socradar_taxii_feed.pyConnects to SOCRadar's TAXII 2.1 endpoint and imports STIX 2.1 indicators into MISP with rich metadata:
labelsand SOCRadar'sextra-info-extextension tags (type: MITRE_ATTCK)confidence-leveltaxonomyextra-info-ext.scorepreserved as tagAbuse.ch-Urlhaus-C&Cs,SOCRadar Research Team) tagged per attributeCOUNTRY-type extension tagsmore+nextJSON cursor paginationImport Module — Configuration
In MISP: Administration → Server Settings → Plugin Settings → Import
SOCRadar STIX 2.1 Data Format
SOCRadar's TAXII response uses standard STIX 2.1 with a custom
extra-info-extextension:Testing
Tested against live SOCRadar TAXII 2.1 production data. Example dry-run output from import module:
Dependencies
requests(already included in misp-modules dependencies)Files Changed
misp_modules/modules/import_mod/socradar_taxii_feed.py— new filemisp_modules/modules/expansion/socradar_lookup.py— new fileAbout the Author
SOCRadar — Enterprise API & Integration Team
- Website: https://socradar.io
- Contact: burak.goger@socradar.io
# Add SOCRadar TAXII Feed Import & IoC Enrichment Expansion ModulesSummary
This PR adds two new modules for SOCRadar threat intelligence integration:
import_mod/socradar_taxii_feed.py) — Import enriched threat indicators from SOCRadar's TAXII 2.1 server into MISP eventsexpansion/socradar_lookup.py) — Enrich MISP attributes by querying SOCRadar's IoC Enrichment REST APIWhat is SOCRadar?
SOCRadar is an Extended Threat Intelligence (XTI) platform that aggregates indicators from 120+ sources. It provides:
Import Module —
socradar_taxii_feed.pyConnects to SOCRadar's TAXII 2.1 endpoint and imports STIX 2.1 indicators into MISP with rich metadata:
labelsand SOCRadar'sextra-info-extextension tags (type: MITRE_ATTCK)confidence-leveltaxonomyextra-info-ext.scorepreserved as tagC&Cs) tagged per attributeCOUNTRY-type extension tagsmore+nextJSON cursor paginationImport Module — Configuration
In MISP: Administration → Server Settings → Plugin Settings → Import
socradar_taxii_urlhttps://taxii2.socradar.comsocradar_api_rootradar_alphasocradar_usernamesocradar_passwordExpansion Module —
socradar_lookup.pyHover and enrichment module that queries SOCRadar's IoC Enrichment REST API (
/ioc_enrichment/get/) for real-time threat intelligence on MISP attributes:ip-src,ip-dst,domain,hostname,url,md5,sha1,sha256,email-src,email-dst/ioc_enrichment/get/indicator_detailsreturning: categorization (malware, scanner, tor, proxy, honeypot, CDN, VPN, etc.), malware families, threat actors, targeted industries, cross-source confidence (Very High / High / Medium / Low), IoC signal strength, feed history with timestamps, ASN and geographic info, and optionally AI-generated threat insight/ioc_enrichment/get/indicator_details_stixfor fast structured STIX 2.1 output with MITRE ATT&CK technique mappings, tags, and feed sourcesexpansion,hoverExpansion Module — Configuration
In MISP: Administration → Server Settings → Plugin Settings → Enrichment
socradar_api_keysocradar_api_urlhttps://platform.socradar.com/apisocradar_modefull(detailed JSON) orstix(fast STIX 2.1)fullsocradar_ai_insightfalseSOCRadar STIX 2.1 Data Format
SOCRadar's TAXII response uses standard STIX 2.1 with a custom
extra-info-extextension:{ "type": "indicator", "pattern": "[file:hashes.sha1 = 'abc123...']", "confidence": 28.0, "labels": ["malware", "t1055", "t1486", "prometei", "botnet"], "extensions": { "extra-info-ext": { "score": 28.5, "tags": [ {"tag": "malware", "type": "TAG", "priority": 1}, {"tag": "t1055", "type": "MITRE_ATTCK", "priority": 10, "description": "Process Injection"}, {"tag": "hong kong", "type": "COUNTRY", "priority": 10} ], "feed_source_list": [ {"source_name": "SOCRadar Research Team-Hash", "seen_count": 1, "first_seen_date": "2025-05-29 13:23:42"} ] } }, "threat_feed_source_name": "SOCRadar Research Team-Hash", "indicator_types": ["malicious-activity"] }Testing
Tested against live SOCRadar TAXII 2.1 production data. Example dry-run output from import module:
Dependencies
requests(already included in misp-modules dependencies)Files Changed
misp_modules/modules/import_mod/socradar_taxii_feed.py— new filemisp_modules/modules/expansion/socradar_lookup.py— new fileAbout the Author
SOCRadar — Enterprise API & Integration Team