Splunk Enterprise Security

Add intelligence to file_intel

panovattack
Communicator

Is there a way to use lookups to add threat intelligence to the non-network based intelligence stores, such as file_intel? I know STIX and OpenIOC can populate these, however, I've got IOCs in CSVs and custom feeds of file names, hashes, etc. Thanks!

0 Karma
1 Solution

mcronkrite
Splunk Employee
Splunk Employee

Yes absolutely, in fact, that's the default threat list style.
The csv files have to have two fields, ip and description, url and description, or domain and description.

http://docs.splunk.com/Documentation/ES/3.3.0/Install/Configureblocklists

View solution in original post

0 Karma

mcronkrite
Splunk Employee
Splunk Employee

Yes absolutely, in fact, that's the default threat list style.
The csv files have to have two fields, ip and description, url and description, or domain and description.

http://docs.splunk.com/Documentation/ES/3.3.0/Install/Configureblocklists

0 Karma

panovattack
Communicator

I've followed the instructions in the documentation for network indicators (IPs, URLs, and Domains) and it work great! However, I can not reproduce those results for fie-based indicators (file names, hashes, etc.).

0 Karma

panovattack
Communicator

fixed in updates of ES

0 Karma
Get Updates on the Splunk Community!

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...