Hello,
I wanted to reach out to you for assistance on Splunk ES threat_intel searches.
Objective:
We have endpoint security logs coming on to our Splunk with file hash values. We want these hash values to match against our threat intel feeds(local/downloaded) and flag them as part ThreatActivityDetected search
Action taken:
We have picked up some of the most noisy hash values and updated them in the local threat file_intel CSV in order test for a positive match.
Observation:
Our threat logs are getting fed into the malware datamodel and "local threat file_intel" holds the hash we uploaded manually. But, we do not see these matching as part of the threat intelligence datamodel. We assumed the threat collect search would pick up any matching hash(with the threat intel data) in search data, but it did not.
Note: We do see the matching data as part of below sample search which is CIM complaint =====>
|datamodel Malware Malware_Attacks search | `file_intel` | search file_hash = our hash value
but somehow threat intel is unable to capture it and flag it.
Is there any threat collect search i need to edit?
Any leads on solving this would be appreciated.
Regards
I am in the same situation. Endpoint filesystem datamodel has file_hash and file_name values. I do see those values uploaded to Threat artifacts dashboard succesfully. However threatintell is not hitting it for some reason. Any help would be apreciated.