Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

host_fqdn field not correctly extracted due to TA-windows new versions #102

Open
timo92700 opened this issue Sep 19, 2022 · 6 comments
Open

Comments

@timo92700
Copy link

timo92700 commented Sep 19, 2022

Hello everyone,
It appears that the "host_fqdn" field evaluation in the props.conf for stanza : "WinEventLog:Microsoft-Windows-Sysmon/Operational" ( And also the XML one ) is based on "Computer" field, but TA-windows seems to have renamed this field to "ComputerName" for a few version now ( i'm running TA windows v8.2.0 ).
This issue causes 90% of the dashboards not working at all.
You have to edit the props.conf as below to make it work again correctly ( in both WinEventLog:Micro**** and XMLWinEventLog:Micro**** stanzas if needed) :
image

Could you please fix the issues in the application ?
Thanks and regards,

@timo92700 timo92700 changed the title host_fqdn fields not correctly extracted host_fqdn field not correctly extracted due to TA-windows new versions Sep 19, 2022
@dstaulcu
Copy link
Contributor

dstaulcu commented Sep 22, 2022

host_fqdn seems to be extracting reliably for me for sysmon events on my splunk server dedicated to the ThreatHunting app and its dependencies.

I have Splunk_TA_windows v8.50 and Splunk_TA_microsoft_sysmon v3.0.0. What are you running?

In your inputs.conf stanza for sysmon:

  • do you have the renderXml set to 1 or True?
  • do you have source spec set to "XmlWinEventLog:Microsoft-Windows-Sysmon/Operational"

Looking at btool of props lines having terms wineventlog or host_fqdn it seems like host_fqdn is derived from Computer field. I don't see a source of conflict when inputs are configured as expected in inputs.conf.

image

Now there does seem to be an issue for other sources at least for me. I know I should change my rendering of PowerShell logs to XML because important context is missing otherwise. Not sure what renderings are expected for others.

image

@dstaulcu
Copy link
Contributor

dstaulcu commented Sep 22, 2022

I've submitted pr #103 as a proposed change to handle issues no matter what wineventlog rendering type the sources of interest have.

image

@timo92700
Copy link
Author

Hello, thank you for your answer.
We are using WinEventLog and not XMLWinEventLog sourcetype ( rederXML is at false in the inputs.conf ) for sysmon collect.
It may explain why Computer field does not exist : it seems to not exist in the non-xml sourcetype ( as on the latest screenshot )
If someone else can confirm :)
Thanks and regards

@dstaulcu
Copy link
Contributor

No problem. I think you will find that a few other field extractions are missing if you continue down the non xml route for sysmon. Id bite the bullet and adapt to the input spec standard for sysmon prescribed in its TA.

@timo92700
Copy link
Author

Ok thanks !
Maybe warn the users in the README / Documentation of ThreatHunting app that the xml sourcetype for sysmon collect is preferable for it to work correctly.

@dstaulcu
Copy link
Contributor

That is a good idea. I stumbled on this sort of issue at first as well and I have many years of experience with sysmon and splunk.
I'd suggest forking this repository and submitting a pull request having your requested changes. I am not the owner of the repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants