NCSCNLShareSTIXBundle
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook gets triggered every hour and perform the following actions: 1. Get all the threat intelligence indicators from Microsoft Sentinel Workspace with given tag. 2. Filter all the indicators whose export in not completed. 3. Share the STIX Bundle, that includes the 'Indicator, corresponding Identities, Markings and optional Sighting' with the to provided TAXII server.
Additional Documentation
📄 Source: NCSCNLShareSTIXBundle/readme.md
NCSC-NL NDN Cyber Threat Intelligence Sharing

Summary
This playbook is inspired on the previous ACSC codecase and is enhanced with an additional Sighting feature and API key support. It gets triggered every day and perform the following actions:
- Get all the threat intelligence indicators from Microsoft Sentinel Workspace with given tag.
- Filter all the indicators whose export in not completed.
- Optional wil include a sighting object to report.
- Verify/Add TLP labels to indicators.
- Add Grouping and Identity Objects to indicators.
- Export the bundle to provided TAXII server.
Prerequisites
- Have TAXII Server Url, Collection ID, your Organization STIX Identity and API Key available before the deployment of the Playbook.
Deployment instructions
- To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required parameters:
- Playbook Name
- TAXII Server Url
- TAXII Server API Key
- Collection ID
- Organization Name
- Organization ID (UUID)
- Microsoft Sentinel Workspace
- Tag for indicators to be exported
- Tag for indicators after export completion
- Default TLP Label
- Optional you can set the following parameters:
- Include Sighting Object (default is yes)
- TAXII Server Username (default is using API Key)
- TAXII Server Password (default is using API Key)

Post-Deployment instructions
a. Authorize Playbook to access Log Analytics Workspace
Once deployment is complete, assign playbook Log Analytics contributor role.
- Go to Log Analytics Workspace resource
- Select Access control (IAM) tab
- Add role assignments
- Select Contributor role
- In the Members tab choose "Assign access to" Managed Identity
- Click on "Select members"
- Provide correct Subscription and Managed Identity
- Provide the playbook name in "Search by name" textbox
- Select the correct identity and click on Select
- Click on "Review + assign"
References
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to NCSC-NL NDN Cyber Threat Intelligence Sharing