I wanted to reach out to you for assistance on Splunk ES threat_intel searches.
We have endpoint security logs coming on to our Splunk with file hash values. We want these hash values to match against our threat intel feeds(local/downloaded) and flag them as part ThreatActivityDetected search
We have picked up some of the most noisy hash values and updated them in the local threat file_intel CSV in order test for a positive match.
Our threat logs are getting fed into the malware datamodel and "local threat file_intel" holds the hash we uploaded manually. But, we do not see these matching as part of the threat intelligence datamodel. We assumed the threat collect search would pick up any matching hash(with the threat intel data) in search data, but it did not.
Note: We do see the matching data as part of below sample search which is CIM complaint =====>