This project is designed to analyze network traffic captured in pcap files, extract Indicators of Compromise (IoCs), and cross-reference them with VirusTotal for threat intelligence. Additionally, it integrates Yara for file scanning and saves the results in JSON and CSV formats for Splunk and Tableau integration, respectively.
PythonSplunkJSONTableau
-
Extracts
IPsandDomains: Parses pcap files to extractIP addressesanddomain names. -
VirusTotal Query: Cross-references extracted
IoCswith VirusTotal to determine malicious activity and reputation scores. -
Yara File Scanning: Scans files using Yara rules to detect potential threats.
-
Results Export: Saves analysis results in
JSON formatforSplunkandCSV formatforTableauvisualization.