Splunk Enterprise Security

inclusion in Datamodel

N92
Path Finder

If there is any source type which has hash values but not action fields like allowed or blocked then it can consider as in malware datamodel.

If not then what would be ideal way to cover the souretype in different usecases.

0 Karma
1 Solution

lakshman239
Influencer

if you have a datasource which can be mapped to Malware datamodel, https://docs.splunk.com/Documentation/CIM/4.12.0/User/Malware, yes, it can be mapped, but you would need to ensure required fields are derived from your data. If you don't have action - allowed/blocked readily available, can that be derived based on other fields/data in your events? If yes, that can be used to calculate a suitable value for action field.

what's your data source.

View solution in original post

0 Karma

lakshman239
Influencer

if you have a datasource which can be mapped to Malware datamodel, https://docs.splunk.com/Documentation/CIM/4.12.0/User/Malware, yes, it can be mapped, but you would need to ensure required fields are derived from your data. If you don't have action - allowed/blocked readily available, can that be derived based on other fields/data in your events? If yes, that can be used to calculate a suitable value for action field.

what's your data source.

0 Karma

N92
Path Finder

My datasource is kind of analytics where multiple values are available like (Hash, URL etc). Ideally they are not part of malware because they doesn't have the alarm values which indicate it's malware.

But I have to use this data with other indexs for the correlation so adding in malware datamodel is good or not. If not then what would be the ideal way?

0 Karma

lakshman239
Influencer

If its not related to malware data, you don't have to add them to datamodel. You can still correlate with you other data(from another index/sourcetype) and join both the data based on common fields.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...