Integration

OpenCTI Connector

Internal enrichment for threat intelligence

Enrich your OpenCTI observables with real-time threat intelligence from isMalicious. Automatic risk scoring, threat categorization, and geolocation data for IPs and domains.

Key Features

Everything you need to protect your infrastructure and users

Multi-Type Enrichment

Enrich IPv4, IPv6 addresses, and domain names with threat intelligence data.

Risk Scoring

Get a 0-100 risk score based on multi-source threat analysis.

Threat Labels

Automatic threat categorization: phishing, malware, C2, botnet, ransomware, spam, scam.

External References

Links to original detection sources and isMalicious detailed reports.

Geolocation Data

Country location entities with sighting relationships when available.

Docker Ready

Easy deployment with Docker and docker-compose. Production-ready container.

Use Cases

How security teams use this tool

Automated Observable Enrichment

Enable auto mode to automatically enrich new observables as they enter OpenCTI.

Investigation Support

Manually enrich observables during investigations to get instant threat context.

Threat Correlation

Use threat labels and risk scores to correlate related malicious infrastructure.

TLP-Aware Processing

Respect TLP markings with configurable maximum TLP level for enrichment.

OpenCTI Internal Enrichment Connector

The isMalicious OpenCTI connector is an internal enrichment connector that automatically adds threat intelligence data to your OpenCTI observables. When an IPv4, IPv6, or domain observable is processed, the connector queries the isMalicious API and enriches the observable with risk scores, threat labels, and external references. This integration is perfect for security teams using OpenCTI as their threat intelligence platform who want to augment their data with real-time reputation information from multiple threat intelligence sources.

Enrichment Data Details

When an observable is enriched, the connector adds comprehensive threat intelligence data: **Risk Score (0-100)**: A confidence-weighted score based on analysis from multiple threat intelligence sources. Higher scores indicate higher risk. **Threat Labels**: Automatic categorization including malicious, phishing, malware, command-and-control, botnet, ransomware, spam, and scam labels. **External References**: Direct links to the isMalicious report and original detection sources for further investigation. **Geographic Data**: When available, country location entities are created with sighting relationships to the observable. This enrichment data integrates seamlessly with OpenCTI's data model, enabling correlation, analysis, and reporting workflows.

Deployment

Deploy the connector using Docker for production environments. The official image is available on Docker Hub at opencti/connector-ismalicious.

# Pull from Docker Hub
docker pull opencti/connector-ismalicious:latest

# Or using docker-compose
docker compose up -d

Configuration Variables

The connector requires your OpenCTI URL and token, plus an isMalicious API key. You can fine-tune enrichment behavior with the following environment variables:

ParameterDocker envvarMandatoryDescription
OpenCTI URLOPENCTI_URLYesThe URL of the OpenCTI platform
OpenCTI TokenOPENCTI_TOKENYesThe token of the OpenCTI user
API KeyISMALICIOUS_API_KEYYesYour isMalicious API key
Auto ModeCONNECTOR_AUTONoEnable automatic enrichment (default: false)
Max TLPISMALICIOUS_MAX_TLPNoMax TLP to process (default: TLP:AMBER)
Min ScoreISMALICIOUS_MIN_SCORENoMinimum risk score to report (default: 0)

Frequently Asked Questions

What observable types does the OpenCTI connector support?
The connector supports IPv4-Addr, IPv6-Addr, and Domain-Name observable types for enrichment.
How do I deploy the OpenCTI connector?
You can deploy using Docker with docker-compose, or manually by installing the Python dependencies and running main.py. Docker is recommended for production deployments.
Does the connector work with OpenCTI auto mode?
Yes, you can enable automatic enrichment by setting CONNECTOR_AUTO=true in your configuration. This will automatically enrich new observables as they enter the platform.
What TLP levels are supported?
The connector respects TLP markings and supports up to TLP:AMBER by default. You can configure MAX_TLP to TLP:RED if needed.
What data is added during enrichment?
The connector adds: risk score (0-100), threat category labels, external references to detection sources, description summaries, and geographic location with sighting relationships.
Can I filter which observables get enriched?
Yes, you can configure ENRICH_IPV4, ENRICH_IPV6, and ENRICH_DOMAIN to enable/disable enrichment for specific types. You can also set MIN_SCORE to only report results above a threshold.

Ready to Get Started?

Join thousands of security teams using isMalicious to protect their infrastructure.