Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Splunk prerequisites list for parsing of attack data #751

Open
ionsor opened this issue May 17, 2022 · 2 comments
Open

Splunk prerequisites list for parsing of attack data #751

ionsor opened this issue May 17, 2022 · 2 comments

Comments

@ionsor
Copy link

ionsor commented May 17, 2022

I would like to suggest as improvement to add details ( or a file ) with prerequisites for ingesting the attack data in a new Splunk instance. If the data is ingested in the UI using the Add data wizard, the data is not parsed, in order for Sysmon for Windows telemetry to be parsed the Add-on "Splunk Add-on for Sysmon" ( https://splunkbase.splunk.com/app/5709/ ) must be installed.
And attack data like https://github.com/splunk/attack_data/tree/master/datasets/malware/cyclopsblink requires "Add-on for Linux Sysmon" ( https://splunkbase.splunk.com/app/6176/ )
This becomes even more complicated since some people might be confused by other add-ons in the Splunk store which are not supported anymore, but may be still found and downloaded from the store.

I think it would make this open source project more accessible if the prerequisites for running the attack data in a freshly installed instance of Splunk it would be specified.

@patel-bhavin
Copy link
Collaborator

@ionsor : I think it's a great idea and it would certainly make easier! we will have evaluate how to programmatically add these fields.

With that said, we currently use this attack data to test our detections in security_content using these TA's

@albertenc13
Copy link

Hi guys @ionsor @patel-bhavin , I am trying to use some of the sysmon logs found here and I am running into an issue where even though I choose the right data source of XmlWinEventLog:Microsoft-Windows-Sysmon/Operational when uploading the data using the GUI to Splunk I get an error saying "Not Found" see the attached picture.

While doing some search I also came across this https://docs.splunk.com/Documentation/Splunk/9.1.2/Data/Uploaddata which states that "The Splunk Add-On for Sysmon is not supported for use with data loaded using the Upload Data functionality. For best results, use one of the supported options to collect Windows Sysmon events as described in the Splunk Add-On for Sysmon manual.
" Does that mean that the datasets here coming from sysmon will not work?

sysmon

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants