Skip to content

External integration: OpenCTI


Collect CTI feed in an existing self-managed OpenCTI instance for any operational purpose (such as CTI aggregation, dissemination, hunting...).


  • An operational OpenCTI instance with administrator privileges
  • An active licence with access to the CTI
  • An access to User Center with the permissions to create an API key with all CTI permissions


  1. Add the following code to the end of docker-compose.yml file in the OpenCTI docker repository

        image: opencti/connector-sekoia:latest
          - OPENCTI_URL=http://opencti:8080
          - CONNECTOR_ID=<Replace_by_email>
          - CONNECTOR_SCOPE=identity,attack-pattern,course-of-action,intrusion-set,malware,tool,report,location,vulnerability,indicator,campaign,infrastructure,relationship
          - CONNECTOR_CONFIDENCE_LEVEL=15 # From 0 (Unknown) to 100 (Fully trusted)
          - CONNECTOR_LOG_LEVEL=info
          - SEKOIA_API_KEY=<Replace_by_Sekoia_API_key>
          - SEKOIA_COLLECTION=d6092c37-d8d7-45c3-8aff-c4dc26030608
          - SEKOIA_START_DATE=2022-01-01    # Optional, the date to start consuming data from. Maybe in the formats YYYY-MM-DD or YYYY-MM-DDT00:00:00
          - SEKOIA_CREATE_OBSERVABLES=true  # Create observables from indicators
        restart: always
          - opencti
  2. Replace the following parameters:

    • CONNECTOR_ID= Replace_by_email or an UUID4
    • CONNECTOR_SCOPE = identity,attack-pattern,course-of-action,intrusion-set,malware,tool,report,location,vulnerability,indicator,campaign,infrastructure,relationship => Sekoia Intelligence elements set to be exported in OpenCTI that can be chosen from this list
    • SEKOIA_API_KEY= Sekoia API key with CTI_Permissions
    • SEKOIA_START_DATE= e.g. 2023-05-01
  3. Build and launch Sekoia connector

    • Build docker-compose pull connector-sekoia
    • Run docker-compose up -d connector-sekoia


    Sekoia connector should be named connector-sekoia as described in the previous section. To check all connectors available and set in the server, type docker-compose ps.

  4. Check if Sekoia connector is running

    docker-compose ps connector-sekoia

Connect to OpenCTI

  1. In a Web browser, type the following URL and replace server_IP and port by their values: http://server_ip:port/dashboard OpenCTI_login

  2. Enter your login and password set in the .env file

Sekoia Intelligence in OpenCTI

  1. First of all, check if the connector is running and up to date. Go to Sekoia connector Data > Connectors > OpenCTI_Sekoia_connector1

    On this page, you can find the following information:

    • Update date: Last update date of the connector in OpenCTI
    • Status: Status of the connector in OpenCTI
    • Perimeter: Sekoia Intelligence feed set for import in docker-compose.yml file under CONNECTOR_SCOPE
    • Last cursor: SEKOIA_START_DATE set in docker-compose.yml file in base64 format


  2. Navigate the Sekoia Intelligence Feed

    Here are the elements of the Sekoia feed that can be found on OpenCTI after export:

    Analysis Threat-reports
    Observations Sightings
    Arsenal Malwares
    Techniques Intrusion-sets
    Data Indicators
  3. Find a Indicator

    Here is an example with an indicator:

    • In, search for the indicator in the Intelligence Page OpenCTI_search1

    • In OpenCTI, look for this indicator in the Data page OpenCTI_search2

    • The content of the indicator will look like the one below OpenCTI_Sekoia_search2


Issue Action Linux command
Space disk full check the logs docker logs
Conflict with containers list containers on server docker-compose ps

Other resources

OpenCTI official documentation

OpenCTI - Using Docker

OpenCTI - Connector Configuration