- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is file_hash field mapping missing for Splunk Add-on for Sysmon?
While reviewing Sysmon events within Endpoint Datamodel, noticed that file_hash information is not available within Filesystem dataset and the field just reads "unknown".
It looks like in the latest Sysmon TA (https://splunkbase.splunk.com/app/5709), alias for file_hash is missing, which is the field required by Endpoint datamodel.
Mapping this with one of the extract hash fields(SHA1, SHA256 etc) should be relatively straightforward but wanted to check with the community first in case I am missing something obvious here.
Thank you,
~ Abhi
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I had the same issue - searching across the Endpoint.Filesystem dataset would return the file_hash field with the value unknown.
I noticed that the calculated field (source::XmlWinEventLog:Microsoft-Windows-Sysmon/Operational : EVAL-file_hash) = case( EventCode IN ("15"), Hash, EventCode IN ("23","26"), Hashes ), and the event type for ms-sysmon-filemod = (source="WinEventLog:Microsoft-Windows-Sysmon/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational") (EventCode IN ("2","11","23","26") ).
I modified the ms-sysmon-filemod to = (source="WinEventLog:Microsoft-Windows-Sysmon/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational") (EventCode IN ("2","11", "15","23","26") )
For some reason Event Code 15 was showing in the event type ms-sysmon-process = (source="WinEventLog:Microsoft-Windows-Sysmon/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational") (EventCode IN ("1","5","6","7","8","9","10", "15","17","18","24","25") )
