/TA-CyberCovid19

Splunk TA to collect CyberCovid threat sources for data enrichment.

Primary LanguagePython

Splunk TA-CyberCOVID19

This Splunk app was created to provide all (finding more of course!) of current sources to those who are fighting the Cyber attacks related to COVID.

New Python re-write - Changed the Lookup table names to simplify by IoC type

There are other projects that provide similar efforts:

Splunk Team - https://github.com/splunk/ta-covidiocs

CTC group - https://github.com/secdevopsteam/splunk-covid-hunt

Splunk instructions

  1. download/clone this repo
  2. install to '$SPLUNK_HOME/etc/apps' like any other TA
  3. Use Searches

Edit the inputs.conf to apply the Python re-write

Splunk Examples

SPL> mysearch_web_logs | lookup  CyberCOVID_DNS

pre-load the lookup

SPL> mysearch_web_logs | [ | inputlookup CyberCOVID_DNS | fields value, TIsource, logic ]

Splunk Lookup table names

covid_DNS_List
covid_IP_List
covid_URL_List
covid_HASH_List

##############################

Author: CTC Member - Jake Babbin

Version: 2.0

SOURCES for the Lookup files

Additional Sources (if you want to add more lookups)

Sources Full List https://github.com/MishcondeReya/Covid-19-CTI