<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sysmon Event Parsing in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Sysmon-Event-Parsing/m-p/569879#M198627</link>
    <description>&lt;P&gt;i think i fixed it on my own, i had some other sysmon apps installed and disabled all but Splunk_TA_microsoft_sysmon&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;AND installed&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Splunk Add-on for Microsoft Windows (pretty sure this is what did it)&lt;/P&gt;</description>
    <pubDate>Wed, 06 Oct 2021 13:09:19 GMT</pubDate>
    <dc:creator>suspicious_link</dc:creator>
    <dc:date>2021-10-06T13:09:19Z</dc:date>
    <item>
      <title>Sysmon Event Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Sysmon-Event-Parsing/m-p/569805#M198599</link>
      <description>&lt;P&gt;I'm having trouble getting all the fields from sysmon automatically parse with the microsoft sysmon add in could someone tell me what i might be missing?&lt;/P&gt;&lt;P&gt;The events are coming into my home splunk instance (8.2.2) but not being fully parsed correctly, I'm pretty sure i need to use a transform, but the one I've tried isn't working (I'm pretty sure i did it wrong but *shrug* no idea if i did or not)&lt;/P&gt;&lt;P&gt;I've installed sysmon on my home computer and have the universal forwarder pointed to my home splunk instance.&lt;/P&gt;&lt;P&gt;I followed the guide i found here: &lt;A href="https://hurricanelabs.com/splunk-tutorials/splunking-with-sysmon-series-part-1-the-setup/" target="_blank"&gt;https://hurricanelabs.com/splunk-tutorials/splunking-with-sysmon-series-part-1-the-setup/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;As you can see in the screenshot it only extracted some of the fields and the IMPHASH value carried over into some other data.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suspicious_link_0-1633474317729.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16285i28A8FEB6E94CA21F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="suspicious_link_0-1633474317729.png" alt="suspicious_link_0-1633474317729.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inputs.conf for sysmon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-Sysmon/Operational]
disabled = false
renderXml = true
source = XMLWinEventLog:Microsoft-Windows-Sysmon/Operational&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;output of my transform with the path:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;cat /opt/splunk/etc/apps/search/default/transforms.conf

[geo_us_states]
external_type = geo
filename = geo_us_states.kmz

[geo_countries]
external_type = geo
filename = geo_countries.kmz

[geo_attr_us_states]
filename = geo_attr_us_states.csv

[geo_attr_countries]
filename = geo_attr_countries.csv

[geo_hex]
external_type=geo_hex

[xmlwineventlog]
REGEX = "Data Name\=\'(?&amp;lt;_KEY_1&amp;gt;[A-Za-z]+)\'&amp;gt;(?&amp;lt;_VAL_1&amp;gt;[^&amp;lt;]+)&amp;lt;\/Data&amp;gt;"
DELIMS = "'&amp;gt;"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's a sample event straight from _raw (looked this event over nothing seemed overly sensitive)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Sysmon' Guid='{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'/&amp;gt;&amp;lt;EventID&amp;gt;1&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;5&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;4&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;1&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8000000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2021-10-05T22:36:40.9004216Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;7090&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='5908' ThreadID='7428'/&amp;gt;&amp;lt;Channel&amp;gt;Microsoft-Windows-Sysmon/Operational&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;eelo&amp;lt;/Computer&amp;gt;&amp;lt;Security UserID='S-1-5-18'/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='RuleName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='UtcTime'&amp;gt;2021-10-05 22:36:40.899&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessGuid'&amp;gt;{ce4bb586-d378-615c-5b1e-000000007100}&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;10476&amp;lt;/Data&amp;gt;&amp;lt;Data Name='Image'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='FileVersion'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='Description'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='Product'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='Company'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='OriginalFileName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;"C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe"&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CurrentDirectory'&amp;gt;C:\WINDOWS\system32\&amp;lt;/Data&amp;gt;&amp;lt;Data Name='User'&amp;gt;NT AUTHORITY\SYSTEM&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonGuid'&amp;gt;{ce4bb586-a1ce-615c-e703-000000000000}&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TerminalSessionId'&amp;gt;0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IntegrityLevel'&amp;gt;System&amp;lt;/Data&amp;gt;&amp;lt;Data Name='Hashes'&amp;gt;MD5=1F8722C371906F7B659FA38B39B21661,SHA256=383581B2E6BE7003CCCC0DAFAE75CBA3B0885C441ACDBD9AE76EAAFD9602A022,IMPHASH=1BDECF92268D3D3EF70015DDFEB0FFB9&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessGuid'&amp;gt;{ce4bb586-d191-615c-2a1d-000000007100}&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessId'&amp;gt;18812&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentImage'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentCommandLine'&amp;gt;"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" service&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 23:05:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Sysmon-Event-Parsing/m-p/569805#M198599</guid>
      <dc:creator>suspicious_link</dc:creator>
      <dc:date>2021-10-05T23:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: Sysmon Event Parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Sysmon-Event-Parsing/m-p/569879#M198627</link>
      <description>&lt;P&gt;i think i fixed it on my own, i had some other sysmon apps installed and disabled all but Splunk_TA_microsoft_sysmon&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;AND installed&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Splunk Add-on for Microsoft Windows (pretty sure this is what did it)&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 13:09:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Sysmon-Event-Parsing/m-p/569879#M198627</guid>
      <dc:creator>suspicious_link</dc:creator>
      <dc:date>2021-10-06T13:09:19Z</dc:date>
    </item>
  </channel>
</rss>

