<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why are there missing fields for sample queries? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Why-are-there-missing-fields-for-sample-queries/m-p/628781#M218414</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I'm implementing some searches provided by Splunk Threat Research Team to detect threats from AD logs. But I cannot set all required fields. For example, one of them is below.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Windows Computer Account Requesting Kerberos Ticket" (&lt;A href="https://research.splunk.com/endpoint/fb3b2bb3-75a4-4279-848a-165b42624770/" target="_blank" rel="noopener"&gt;https://research.splunk.com/endpoint/fb3b2bb3-75a4-4279-848a-165b42624770/&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;It requires some fields that I cannot find , such as subject, and action.&lt;/P&gt;
&lt;P&gt;Below is a sample log. I can't find which value I should extract as a "subject" and "action".&amp;nbsp; I use "WinEventLog:Security" as sourcetype.&amp;nbsp; I installed the&amp;nbsp;&lt;SPAN&gt;TA-microsoft-windows.&amp;nbsp; Thank you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4768
EventType=0
Type=Information
ComputerName=win-dc-128.attackrange.local
TaskCategory=Kerberos Authentication Service
OpCode=Info
RecordNumber=2106676187
Keywords=Audit Success
Message=A Kerberos authentication ticket (TGT) was requested.

Account Information:
	Account Name:		PC-DEMO$
	Supplied Realm Name:	attackrange.local
	User ID:			ATTACKRANGE\PC-DEMO$

Service Information:
	Service Name:		krbtgt
	Service ID:		ATTACKRANGE\krbtgt

Network Information:
	Client Address:		::ffff:10.0.1.15
	Client Port:		59022

Additional Information:
	Ticket Options:		0x40800010
	Result Code:		0x0
	Ticket Encryption Type:	0x12
	Pre-Authentication Type:	2

Certificate Information:
	Certificate Issuer Name:		
	Certificate Serial Number:	
	Certificate Thumbprint:		&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Jan 2023 16:33:46 GMT</pubDate>
    <dc:creator>syamaguchi3</dc:creator>
    <dc:date>2023-01-30T16:33:46Z</dc:date>
    <item>
      <title>Why are there missing fields for sample queries?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-are-there-missing-fields-for-sample-queries/m-p/628781#M218414</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I'm implementing some searches provided by Splunk Threat Research Team to detect threats from AD logs. But I cannot set all required fields. For example, one of them is below.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Windows Computer Account Requesting Kerberos Ticket" (&lt;A href="https://research.splunk.com/endpoint/fb3b2bb3-75a4-4279-848a-165b42624770/" target="_blank" rel="noopener"&gt;https://research.splunk.com/endpoint/fb3b2bb3-75a4-4279-848a-165b42624770/&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;It requires some fields that I cannot find , such as subject, and action.&lt;/P&gt;
&lt;P&gt;Below is a sample log. I can't find which value I should extract as a "subject" and "action".&amp;nbsp; I use "WinEventLog:Security" as sourcetype.&amp;nbsp; I installed the&amp;nbsp;&lt;SPAN&gt;TA-microsoft-windows.&amp;nbsp; Thank you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4768
EventType=0
Type=Information
ComputerName=win-dc-128.attackrange.local
TaskCategory=Kerberos Authentication Service
OpCode=Info
RecordNumber=2106676187
Keywords=Audit Success
Message=A Kerberos authentication ticket (TGT) was requested.

Account Information:
	Account Name:		PC-DEMO$
	Supplied Realm Name:	attackrange.local
	User ID:			ATTACKRANGE\PC-DEMO$

Service Information:
	Service Name:		krbtgt
	Service ID:		ATTACKRANGE\krbtgt

Network Information:
	Client Address:		::ffff:10.0.1.15
	Client Port:		59022

Additional Information:
	Ticket Options:		0x40800010
	Result Code:		0x0
	Ticket Encryption Type:	0x12
	Pre-Authentication Type:	2

Certificate Information:
	Certificate Issuer Name:		
	Certificate Serial Number:	
	Certificate Thumbprint:		&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 16:33:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-are-there-missing-fields-for-sample-queries/m-p/628781#M218414</guid>
      <dc:creator>syamaguchi3</dc:creator>
      <dc:date>2023-01-30T16:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Why are there missing fields for sample queries?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-are-there-missing-fields-for-sample-queries/m-p/628877#M218450</link>
      <description>&lt;P&gt;From the sample log, subject can contain the value "A Kerberos authentication ticket (TGT) was requested." and the field action should contain "success" if the value for the field Keywords is "Audit Success" and "failure" if the value for the field Keywords is "Audit Failure". This is a calculated field so if its not populating already, you can create easily via settings -&amp;gt; fields -&amp;gt; calculated fields.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 17:59:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-are-there-missing-fields-for-sample-queries/m-p/628877#M218450</guid>
      <dc:creator>shivanshu1593</dc:creator>
      <dc:date>2023-01-30T17:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why are there missing fields for sample queries?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-are-there-missing-fields-for-sample-queries/m-p/629345#M218625</link>
      <description>&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 14:19:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-are-there-missing-fields-for-sample-queries/m-p/629345#M218625</guid>
      <dc:creator>syamaguchi3</dc:creator>
      <dc:date>2023-02-02T14:19:34Z</dc:date>
    </item>
  </channel>
</rss>

