Get Open Threat Exchange data into Splunk.
This add-on polls the OTX API and indexes pulses, and their related indicators, into Splunk.
You can then use these indicators and pulses you see fit, however if you are a Splunk for Enterprise Security user you should also get the partner app SA-otx, which uses this data and adds threat indicators into the Splunk ES threat collections.
To use this add-on:
- Sign-up to OTX: https://otx.alienvault.com -- You will automatically be subscribed to public threats published by AlienVault, but you can also sign up to other useful groups and users. It's recommended that you subscribe to the groups and users you wish to follow now, so that the initial backfill gets all your subscribed pulses.
- Retrieve your API key at: https://otx.alienvault.com/api
- Create the Splunk index "otx"
- Navigate to the "Addon for OTX" app in Splunk
- Create an input for OTX pulses and indicators using your OTX key and the new index you created
Soon after this point you should soon be able to see OTX data by searching:
index=otx sourcetype=otx:pulse
index=otx sourcetype=otx:indicator
Of note:
- The
otx:indicator
events contain apulse_id
, which link it to theid
of a correspondingotx:pulse
. - The input picks up any modified pulses since last poll, so you may wish to use
| dedup id
to limit to the latest reported details of an individualotx:pulse