Splunk Enterprise Security

Why is "Threat file_intel" not capturing hash values from the Splunk search result?



I wanted to reach out to you for assistance on Splunk ES threat_intel searches.

We have endpoint security logs coming on to our Splunk with file hash values. We want these hash values to match against our threat intel feeds(local/downloaded) and flag them as part ThreatActivityDetected search

Action taken:
We have picked up some of the most noisy hash values and updated them in the local threat file_intel CSV in order test for a positive match.

Our threat logs are getting fed into the malware datamodel and "local threat file_intel" holds the hash we uploaded manually. But, we do not see these matching as part of the threat intelligence datamodel. We assumed the threat collect search would pick up any matching hash(with the threat intel data) in search data, but it did not.

Note: We do see the matching data as part of below sample search which is CIM complaint =====>

|datamodel Malware Malware_Attacks search | `file_intel` | search file_hash = our hash value

but somehow threat intel is unable to capture it and flag it.

Is there any threat collect search i need to edit?

Any leads on solving this would be appreciated.



I am in the same situation. Endpoint filesystem datamodel has file_hash and file_name values. I do see those values uploaded to Threat artifacts dashboard succesfully. However threatintell is not hitting it for some reason. Any help would be apreciated.

Get Updates on the Splunk Community!

Admin Your Splunk Cloud, Your Way

Join us to maximize different techniques to best tune Splunk Cloud. In this Tech Enablement, you will get ...

Cloud Platform | Discontinuing support for TLS version 1.0 and 1.1

Overview Transport Layer Security (TLS) is a security communications protocol that lets two computers, ...

New Customer Testimonials

Enterprises of all sizes and across different industries are accelerating cloud adoption by migrating ...