Elastic Security stores threat indicators in theDocumentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
threat.indicator fields of the Elastic Common Schema (ECS), making them available for correlation rules, timeline investigations, and indicator match rules. You can populate these fields by polling the SOC Defenders REST API with a Python script or custom integration, or — on Pro — by configuring the Threat Intelligence TAXII integration in Elastic Agent to handle polling automatically.
Option 1: REST API with custom ingest
Use a Python script to pollGET /api/v1/iocs on a schedule, map the response fields to ECS, and index the documents into Elasticsearch.
Poll the API and index to Elasticsearch
The following script fetches IPv4 indicators and indexes them into an Elasticsearch index namedlogs-ti.socdefenders-default. Adjust the IOC_TYPE and INDEX variables to suit your environment.
poll_and_index.py
ECS field mapping
| SOC Defenders field | ECS field |
|---|---|
value (IP) | threat.indicator.ip |
value (domain) | threat.indicator.url.domain |
value (hash) | threat.indicator.file.hash.sha256 |
confidence | threat.indicator.confidence |
source.feed_name | threat.indicator.provider |
type | threat.indicator.type |
Option 2: TAXII via Elastic Agent (Pro)
Elastic Agent includes a Threat Intelligence integration that supports TAXII 2.1 feeds. Once configured, Elastic Agent polls the SOC Defenders TAXII server on a schedule and indexes STIX 2.1 objects directly into ECS-mapped fields — no custom code required.The TAXII integration requires a SOC Defenders Pro subscription.
Add the Threat Intelligence integration
In Kibana, go to Fleet → Integrations and search for Threat Intelligence. Select the integration and click Add Threat Intelligence.
Configure the TAXII source
In the integration settings, choose TAXII as the source type and enter the following:
| Field | Value |
|---|---|
| TAXII server | https://www.socdefenders.ai/api/taxii2/api/ |
| Collection ID | all (or ips, hashes, cves) |
| Username | apikey |
| Password | Your SOC Defenders API key |
| Poll interval | 1h |
Assign to an agent policy
Assign the integration to an Elastic Agent policy and deploy. Elastic Agent will begin polling and indexing indicators automatically.