Wazuh SIEM — OpenCTI Threat Intel Integration

Intro

Wazuh manager integration with OpenCTI for Threat Intel.

Requirements.

  • OpenCTI instance up and running.
  • OpenCTI API Token
  • Root CA used to sign OpenCTI’s digital certificate (if HTTPS enabled).

Wazuh capability.

Custom integration.

Event types / Rule groups to trigger OpenCTI API calls.

Event Types to be analyzed in threat intel

OpenCTI Labels Import

Observables or Indicators in OpenCTI enriched with labels providing context will get their labels imported and displayed as part of the Wazuh alert. The integration will add an array with all the labels included as part of the API response.

OpenCTI — IoC Labels

Threat Intel Events and Alerts

Positive matches in OpenCTI trigger high level alert including:

  • IoC type.
  • Score
  • Labels providing context to each indicator.
OpenCTI — Threat Intel Summary
OpenCTI — Labels Imported into the Alerts
OpenCTI — Alerts Threat Intel Details

--

--

SOCFortress is a SaaS company that unifies Observability, Security Monitoring, Threat Intelligence and Security Orchestration, Automation, and Response (SOAR).

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
SOCFortress

SOCFortress is a SaaS company that unifies Observability, Security Monitoring, Threat Intelligence and Security Orchestration, Automation, and Response (SOAR).