Getting Data In

Extract full XML from Windows EventLog sent by UF

Cbr1sg
Path Finder

Hello all,
I have some events like this which are forwarded to Splunk from UF

<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-A5BA-3E3B0328C30D}'/><EventID>5058</EventID><Version>0</Version><Level>0</Level><Task>12292</Task><Opcode>0</Opcode><Keywords>0x8020000000000000</Keywords><TimeCreated SystemTime='2019-01-18T07:53:58.917178000Z'/><EventRecordID>24044556</EventRecordID><Correlation/><Execution ProcessID='580' ThreadID='22604'/><Channel>Security</Channel><Computer>xxx</Computer><Security/></System><EventData><Data Name='SubjectUserSid'>S-1-5-20</Data><Data Name='SubjectUserName'>xxx</Data><Data Name='SubjectDomainName'>xxx</Data><Data Name='SubjectLogonId'>0x3e4</Data><Data Name='ProviderName'>Microsoft Software Key Storage Provider</Data><Data Name='AlgorithmName'>UNKNOWN</Data><Data Name='KeyName'>20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020</Data><Data Name='KeyType'>%%2499</Data><Data Name='KeyFilePath'>C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020</Data><Data Name='Operation'>%%2458</Data><Data Name='ReturnCode'>0x0</Data></EventData></Event>

my props.conf looks like this

[source::WinEventLog]
TZ = Europe/London
REPORT-xmlkv = xmlkv-alternative

my transforms.conf looks like this

[xmlkv-alternative]
REGEX = <([^\s\>]*)[^\>]*\>([^<]*)\<\/\1\>
FORMAT = $1::$2

the result i get for Data field is like this
S-1-5-20

What i expect from the Data field is like this

<Data Name='SubjectUserSid'>S-1-5-20</Data>
<Data Name='SubjectUserName'>xxx</Data>
<Data Name='SubjectDomainName'>xxx</Data>
<Data Name='SubjectLogonId'>0x3e4</Data>
<Data Name='ProviderName'>Microsoft Software Key Storage Provider</Data>
<Data Name='AlgorithmName'>UNKNOWN</Data>
<Data Name='KeyName'>20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020</Data>
<Data Name='KeyType'>%%2499</Data>
<Data Name='KeyFilePath'>C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020</Data>
<Data Name='Operation'>%%2458</Data>
<Data Name='ReturnCode'>0x0</Data>

Or (preferred)

'SubjectUserSid'=S-1-5-20
'SubjectUserName'=xxx
'SubjectDomainName'=xxx
'SubjectLogonId'=0x3e4
'ProviderName'=Microsoft Software Key Storage Provider
'AlgorithmName'=UNKNOWN
'KeyName'=20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020
'KeyType'=%%2499
'KeyFilePath'=C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\20edf1c5b7372d0abb08e7175c58b0f1_81e1b500-e237-4510-a356-3d55074d9020
'Operation'=%%2458
'ReturnCode'=0x0

Can this be done? Thanks

0 Karma
1 Solution

a_m_s
Explorer

Your "preferred" result :)-
event_source|rex field=_raw "(.?)>(.?))<\/Data>" max_match=20 | mvexpand a | rex field=result mode=sed "s/>/=/g"

alt text

View solution in original post

0 Karma

a_m_s
Explorer

Your "preferred" result :)-
event_source|rex field=_raw "(.?)>(.?))<\/Data>" max_match=20 | mvexpand a | rex field=result mode=sed "s/>/=/g"

alt text

View solution in original post

0 Karma

Cbr1sg
Path Finder

The rex in the screenshot works, thanks mate!

0 Karma

a_m_s
Explorer

You can used spath also.You will get two fields.Use eval to concatenate the two fields.

0 Karma
.conf21 Now Fully Virtual!
Register for FREE Today!

We've made .conf21 totally virtual and totally FREE! Our completely online experience will run from 10/19 through 10/20 with some additional events, too!