TAXII2 Server
TAXII Server Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.1.0 and later.
#
TAXII2 Server IntegrationThis integration provides TAXII2 Services for system indicators (outbound feed). You can choose to use TAXII v2.0 or TAXII v2.1.
#
Configure CollectionsEach TAXII collection in the integration is represented by a Cortex XSOAR indicator query.
The collections are defined by a JSON object in the following format:
You can add a collection description as is done in collection1_name, or enter only a collection query, as in collection2_name.
#
How to Access the TAXII2 Server#
For Cortex XSOAR 6.xUse one of the following options:
https://<xsoar_address>/instance/execute/<instance_name>/<taxii2_api_endpoint>/
http://<xsoar_address>:<listen_port>/<taxii2_api_endpoint>/
#
For Cortex XSOAR 8 On-prem, Cortex XSOAR 8 Cloud, or Cortex XSIAMUse https://ext-<tenant>/xsoar/instance/execute/<instance-name>/<taxii2_api_endpoint>/
Note:
- For Cortex XSOAR 8 On-prem, you need to add the
ext-
FQDN DNS record to map the Cortex XSOAR DNS name to the external IP address.
For example,ext-xsoar.mycompany.com
. - The instance name cannot be changed after saving the integration configuration.
#
Access the TAXII Service by Instance NameTo access the TAXII service by instance name, make sure Instance execute external is enabled.
In Cortex XSOAR 6.x:
- Navigate to Settings > About > Troubleshooting.
- In the Server Configuration section, verify that the instance.execute.external key is set to true. If this key does not exist, click + Add Server Configuration, add the instance.execute.external and set the value to true.
#
How to Use HTTPSTo use HTTPS, a certificate and private key have to be supplied in the integration configuration.
#
Set up Authentication#
For Cortex XSOAR 8 Cloud Tenant or Cortex XSIAM TenantThe TAXII2 Server integration running on a Cortex XSOAR 8 Cloud tenant or Cortex XSIAM tenant enables using basic authentication in the requests.
To enable basic authentication, a user and password must be supplied in the Credentials parameters in the integration configuration.
The server will then authenticate the requests by the Authorization
header, expecting basic authentication encrypted in base64 to match the given credentials.
#
For Cortex XSOAR On-prem (6.x or 8) or When Using EnginesFor Cortex XSOAR On-prem (6.x or 8) or when using engines, you can set up authentication using custom certificates. For more information on setting up a custom certificate for Cortex XSOAR 8 On-prem, see HTTPS with a signed certificate. For more information on setting up a custom certificate for Cortex XSOAR 6.x, see HTTPS with a Signed Certificate.
#
TAXII v2.0 API EndpointsURL | Method | Response | TAXII2 Documentation |
---|---|---|---|
/taxii/ | GET | Server Discovery Information. | Server Discovery |
/{api_root}/ | GET | Cortex XSOAR API root is threatintel. | API Root Information |
/{api_root}/collections/ | GET | All Cortex XSOAR collections that configure in Collection JSON parameter. | Collections Resource |
/{api_root}/collections/{collection_id}/ | GET | Cortex XSOAR Collection with given collection_id. | Collection Response |
/{api_root}/collections/{collection_id}/manifest/ | GET | Object manifests from the given collection. | Objects Manifest Resource |
/{api_root}/collections/{collection_id}/objects/ | GET | Objects (Cortex XSOAR Indicators) from the given collection. | Object Resource |
For more information, visit TAXII2 Documentation.
#
TAXII v2.1 API EndpointsURL | Method | Response | TAXII2 Documentation |
---|---|---|---|
/taxii2/ | GET | Server Discovery Information. | Server Discovery |
/{api_root}/ | GET | XSOAR API root is threatintel. | API Root Information |
/{api_root}/collections/ | GET | All Cortex XSOAR collections that configure in Collection JSON parameter. | Collections Resource |
/{api_root}/collections/{collection_id}/ | GET | Cortex XSOAR Collection with given collection_id. | Collection Response |
/{api_root}/collections/{collection_id}/manifest/ | GET | Object manifests from the given collection. | Objects Manifest Resource |
/{api_root}/collections/{collection_id}/objects/ | GET | Objects (Cortex XSOAR Indicators and Relationships) from the given collection. | Object Resource |
For more information, visit TAXII2 Documentation.
#
Known Limitations- GET objects by ID is not allowed.
- Filtering objects by ID or version not allowed.
- POST and DELETE objects are not allowed. Cannot add or delete indicators using TAXII2 Server.
#
How UUIDs Work for TAXII2 in Cortex XSOAR#
STIX Cyber Objects (SCO)All STIX SCOs UUIDs follow STIX 2.1 guidelines and use UUID5 with STIX unique namespace (00abedb4-aa42-466c-9c01-fed23315a9b7). This is used so all SCOs created have persistent UUID across all producers.
#
STIX Domain Objects (SDO)Unlike SCOs, STIX 2.1 specs for SDOs require a UUID4. While this solution works if the UUID is part of the database, it is not the case in Cortex XSOAR. If the SDO already has a unique UUID stored it will use it, if not it will generate a unique and persistent UUID using the following method.
A general UUID5 is created using the NameSpace_URL as follows:
PAWN_UUID = uuid.uuid5(uuid.NAMESPACE_URL, 'https://www.paloaltonetworks.com')
The generated UUID is then used to create a unique UUID5 per customer:
UNIQUE_UUID = uuid.uuid5(PAWN_UUID, <UniqueCostumerString>)
We then use this UUID as a base namespace to generate UUIDs for SDOs following the STIX 2.1 specs. Using this method, we create unique and persistent UUIDs per customer.
#
Cortex XSOAR TIM Extension FieldsWhen selected in the integration settings (Cortex XSOAR Extension Fields) the TAXII2 integration will generate an extension object and an extension attribute that holds Cortex XSOAR additional TIM fields (system generated and custom). An example of these two related objects:
#
Performance BenchmarkIndicators Amount | Request time (seconds) |
---|---|
10,000 | 5-10 |
50,000 | 30-40 |
100,000 | 50-90 |
#
Microsoft Sentinel Configuration Guide#
Configure the TAXII2 Server InstanceSet TAXII2 Server version to 2.0 (The integration currently doesn't work with Microsoft Sentinel in TAXII Version 2.1).
Under STIX types for STIX indicator Domain Object select the indicator types you want to ingest.
Set the Listen Port and Collection JSON to your linking.
#
Find the Information Required for the Sentinel TAXII Connector#
For Cortex XSOAR 6.x- All your server info can be found by running
!taxii-server-info
, the default API root for you server will usually be -https://<xsoar-server>/instance/execute/<instance_name>/threatintel/
- You can use the
!taxii-server-list-collections
command in order to get a list of your server's collections and their IDs. You can also do it manually by runningcurl https://<xsoar-server>/instance/execute/<instance_name>/threatintel/collections/ | jq .
to get a list of the collections available and on your TAXII server. From the list, copy the correct ID of the collection you want to ingest.
#
For Cortex XSOAR 8 On-prem, Cortex XSOAR Cloud, or Cortex XSIAM- All your server info can be found by running
!taxii-server-info
, the default API root for you server will usually be -https://ext-<tenant>.crtx.<region>.paloaltonetworks.com/xsoar/instance/execute/<instance-name>/threatintel/
- You can use the
!taxii-server-list-collections
command in order to get a list of your server's collections and their IDs. You can also do it manually by runningcurl https://ext-<tenant>.crtx.<region>.paloaltonetworks.com/xsoar/instance/execute/<instance-name>/threatintel/collections/ | jq .
to get a list of the collections available and on your TAXII server. From the list, copy the correct ID of the collection you want to ingest.
Response Example:
#
Set up the Microsoft Sentinel TAXII ConnectorNow that we have the API root URL and the collection ID we can configure the Threat intelligence - TAXII Connector in Microsoft Sentinel.
Paste your API root URL in the field marked API Root URL and the desired collection ID we got in step (2) under Collection ID.
Example:
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
taxii-server-list-collectionsReturns all the collections.
#
Base Commandtaxii-server-list-collections
#
InputThere are no input arguments for this command.
#
Context OutputPath | Type | Description |
---|---|---|
TAXIIServer.Collection.id | String | The collection ID. |
TAXIIServer.Collection.query | String | The collection query. |
TAXIIServer.Collection.title | String | The collection title. |
TAXIIServer.Collection.description | String | The collection description. |
#
Command example!taxii-server-list-collections
#
Context Example#
Human Readable Output#
Collections
id title query description 2eb7bfae-7739-5863-9b00-1681309c3d8c ALL
#
taxii-server-infoReturns the TAXII server info, default URL, title, etc.
#
Base Commandtaxii-server-info
#
InputThere are no input arguments for this command.
#
Context OutputPath | Type | Description |
---|---|---|
TAXIIServer.ServerInfo.title | String | The server title |
TAXIIServer.ServerInfo.api_roots | Unknown | The server API roots URLs. |
TAXIIServer.ServerInfo.default | String | The default URL. |
TAXIIServer.ServerInfo.description | String | The server description |
#
Command Example!taxii-server-info
#
Context Example#
Human Readable OutputIn case the default URL is incorrect, you can override it by setting the "TAXII2 Service URL Address" field in the integration configuration
#
Server Info
api_roots default description title https://foo.cooo.com/inc/threatintel/ https://foo.cooo.com/inc/threatintel/ This integration provides TAXII Services for system indicators (Outbound feed). Cortex XSOAR TAXII2 Server