Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fields are not renamed to follow CIM #12

Open
balajifunny opened this issue Sep 2, 2021 · 4 comments
Open

Fields are not renamed to follow CIM #12

balajifunny opened this issue Sep 2, 2021 · 4 comments

Comments

@balajifunny
Copy link

I see many of the fields are not mapped with Malware Datamodel.

@diogofgm
Copy link
Owner

diogofgm commented Sep 2, 2021

Which fields are you missing? For almost all the splunk apps and add-one I develop I try to extract the fields used by enterprise security as much as it's available in the data I have access. If you do have some data that has data that could be mapped to the malware CIM datamodel can you post here so I can have a look?
From my experience several apps do not contain fields available in the data to be mapped against all the available fields in the CIM datamodels. Some have more others have really few.

@balajifunny
Copy link
Author

image
filepath is the field available in events but that doesn't match field file_path in Malware datamodel. Hash field is not extracted.
Hash: 1da542bbc1b14ec2bb2b03096b8b3a7e9247ddbf98db81cfb4283d8c4ecbefdc
I am talking about sourcetype: sourcetype="kaspersky:gnrl"

@balajifunny
Copy link
Author

username field not aliased to user which is used in datamodel

@diogofgm
Copy link
Owner

The file path is extracted as file_path in the add-on. So that extraction you're seeing is not coming from the add-on. Can you share some sample events where you are being this happening?
Regrading the hash the sample data I had access to build the add-on did not include file hash. Can you share some sample events where you see those?
Regarding the user name, again I don't have extractions with "username", just user. These cases might be related to the auto kv splunk does.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants