While reviewing Sysmon events within Endpoint Datamodel, noticed that file_hash information is not available within Filesystem dataset and the field just reads "unknown".
It looks like in the latest Sysmon TA (https://splunkbase.splunk.com/app/5709), alias for file_hash is missing, which is the field required by Endpoint datamodel.
Mapping this with one of the extract hash fields(SHA1, SHA256 etc) should be relatively straightforward but wanted to check with the community first in case I am missing something obvious here.
Thank you,
~ Abhi
I had the same issue - searching across the Endpoint.Filesystem dataset would return the file_hash field with the value unknown.
I noticed that the calculated field (source::XmlWinEventLog:Microsoft-Windows-Sysmon/Operational : EVAL-file_hash) = case( EventCode IN ("15"), Hash, EventCode IN ("23","26"), Hashes ), and the event type for ms-sysmon-filemod = (source="WinEventLog:Microsoft-Windows-Sysmon/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational") (EventCode IN ("2","11","23","26") ).
I modified the ms-sysmon-filemod to = (source="WinEventLog:Microsoft-Windows-Sysmon/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational") (EventCode IN ("2","11", "15","23","26") )
For some reason Event Code 15 was showing in the event type ms-sysmon-process = (source="WinEventLog:Microsoft-Windows-Sysmon/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational") (EventCode IN ("1","5","6","7","8","9","10", "15","17","18","24","25") )