Skip to main content

Set Up ReversingLabs TAXII Feeds in OpenCTI

Introduction

ReversingLabs provides a suite of premium TAXII (Trusted Automated Exchange of Intelligence Information) threat intelligence feeds that integrate seamlessly with OpenCTI. These specialized feeds deliver comprehensive, real-time threat data including malware indicators, emerging attack patterns, and threat actor intelligence in standardized STIX format. Security teams can leverage these feeds to enhance their threat detection capabilities, automate intelligence workflows, and maintain an up-to-date threat landscape view within their OpenCTI deployment. The integration process is straightforward, requiring only valid ReversingLabs API credentials and the proper configuration of OpenCTI connector parameters to begin ingesting these valuable intelligence sources into your security operations environment.

Add a new feed

  1. From the menu bar, select Data > Ingestion
  2. In the Ingestion menu, click TAXII Feeds
  3. Click the + button to begin configuring the feed

Configure the feed settings

The table below describes the feed configuration settings and their possible values:

SettingDescriptionExample
NameA custom name to describe the feed.RL Ransomware Feed
DescriptionA freeform text field to further describe the feed.STIX/TAXII feed that contains indicators related to common ransomware families provided by ReversingLabs.
TAXII Server URLThe URL of the TAXII feed server.https://data.reversinglabs.com/api/taxii/<feed-name>/
TAXII CollectionThe ID of the feed collection.12345678-1234-5678-1234-567812345678
Authentication typeThe method used to authenticate to the indicator feed.Select Basic user / password for RL feeds.
User responsible for data creationCreated indicators will appear in OpenCTI with a creator value. Leaving this blank will show "system" as the creator.N/A
Import from dateDate selection to start pulling indicators from.N/A
Current ReversingLabs TAXII Feed Server URLs and Collection IDs:
Feed NameServer URLCollection ID
Ransomware Feed (TCTF-0001)https://data.reversinglabs.com/api/taxii/ransomware-api-root/f0997a32-b823-562d-9856-c754ac5e1159
Ransomware Feed Lite (TCTF-0002)https://data.reversinglabs.com/api/taxii/ransomware-lite/024d3659-c21c-533f-88c9-3ad10607a040
Flexible Intelligence Feed (TCTF-0003)https://data.reversinglabs.com/api/taxii/flexible-intel-feeds/This ID is uniquely generated. Contact support for more information.

After saving the settings, the feed will now appear in the list of available TAXII feeds:

Ingest indicators

Once the feed is set up, you must start the data ingestion process.

  1. From the menu bar, select Data > Ingestion
  2. In the Ingestion menu, click "TAXII Feeds"
  3. Find the feed from which you wish to ingest data, then click the menu icon for that feed.
  4. Click "Start"

The feed status will change from "INACTIVE" to "ACTIVE".

Validate ingestion

After activating the feed, validate that the ingestion process is working.

  1. From the menu bar, select Data > Ingestion
  2. In the Ingestion menu, click the corresponding entry for the created feed (the name starts with [FEED - TAXII])
  3. The next page will display the current status of the feed and the ingestion operations that have been completed or are in progress.

Next, validate that indicators are available.

  1. From the menu bar, select Observations > Indicators
  2. Look for indicators with the author value "ReversingLabs" and a creator value that matches the user specified during configuration.