All the IoC’s I have gathered which are used directly in coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns. All IOC’s are provided “as-is”, please use your own verification methodology before deploying them in production network.
Remember, architecture is the base and everything else is an additional layer. Stronger your systems security architecture, lesser the possiblity of undesired incidents.
APT36 has been known to use this pandemic to target. These have been include in the list.