You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+107-1Lines changed: 107 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,7 @@ In Splunk Web:
163
163
164
164
#### 2. Configure the OpenCTI Modular Input (Index Mode)
165
165
166
-
1. From the "OpenCTI for Splunk Enterprise Add-on" sub menus, select the "Inputs" sub menu.
166
+
1. From the "OpenCTI for Splunk Enterprise" Add-on sub menus, select the "Inputs" sub menu.
167
167
2. Click on "Create new input" button.
168
168
3. Complete the form with the following settings:
169
169
@@ -289,3 +289,109 @@ Run these searches to confirm everything is working:
289
289
| inputlookup opencti_indicators
290
290
| head 10
291
291
```
292
+
293
+
## OpenCTI custom alert actions
294
+
295
+
You can use the "OpenCTI for Splunk Enterprise" to create custom alert actions that automatically create 'incidents' or/and 'incident response cases' or/and 'sighting' in response to alert trigger by Splunk.
296
+
297
+
### Create an incident or/and an incident response case or/and a sighting in OpenCTI
298
+
299
+
You can create an incident or an incident response case in OpenCTI from a custom alert action.
300
+
1. Write a Splunk search query.
301
+
2. Click Save As > Alert.
302
+
3. Fill out the Splunk Alert form. Give your alert a unique name and indicate whether the alert is a real-time alert or a scheduled alert.
303
+
4. Under Trigger Actions, click Add Actions.
304
+
5. From the list, select "OpenCTI - Create Incident" if you want the alert to create an incident in OpenCTI or "OpenCTI - Create Incident Response" if you want to create an incident response case in OpenCTI or "OpenCTI - Create Sighting" if you want to create a sighting in OpenCTI.
|`Sighting Of (value)`| Value of what was sighted | Sighting |
326
+
|`Sighting Of (type)`| Type of what was sighted (URL, Domain, IPV4, IPV6) | Sighting |
327
+
|`Where Sighted (value)`| Value of the 'System' or 'Organization' that saw the sighting | Sighting |
328
+
|`Where Sighted (type)`| 'System' or 'Organization' that saw the sighting | Sighting |
329
+
|`Labels`| Labels (separated by a comma) to be applied | Sighting |
330
+
|`TLP`| Markings to be applied | Sighting |
331
+
332
+
You can use [Splunk "tokens"](https://docs.splunk.com/Documentation/Splunk/9.2.2/Alert/EmailNotificationTokens#Result_tokens) as variables in the form to contextualize the data imported into OpenCTI.
333
+
Tokens represent data that a search generates. They work as placeholders or variables for data values that populate when the search completes.
334
+
335
+
Example of a configuration to create an incident in OpenCTI
To extract and model alert fields as OpenCTI observables attached to the incident or incident response case, the Add-on purpose two methods describe below.
342
+
343
+
#### CIM model
344
+
345
+
The “CIM model” method is based on the definition of CIM model fields. With this method, the Add-on will extract all the following fields and model them as follows:
0 commit comments