Splunk Search

Why are there missing fields for sample queries?

syamaguchi3
Explorer

Hi

I'm implementing some searches provided by Splunk Threat Research Team to detect threats from AD logs. But I cannot set all required fields. For example, one of them is below. 

"Windows Computer Account Requesting Kerberos Ticket" (https://research.splunk.com/endpoint/fb3b2bb3-75a4-4279-848a-165b42624770/)

It requires some fields that I cannot find , such as subject, and action.

Below is a sample log. I can't find which value I should extract as a "subject" and "action".  I use "WinEventLog:Security" as sourcetype.  I installed the TA-microsoft-windows.  Thank you.

LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4768
EventType=0
Type=Information
ComputerName=win-dc-128.attackrange.local
TaskCategory=Kerberos Authentication Service
OpCode=Info
RecordNumber=2106676187
Keywords=Audit Success
Message=A Kerberos authentication ticket (TGT) was requested.

Account Information:
	Account Name:		PC-DEMO$
	Supplied Realm Name:	attackrange.local
	User ID:			ATTACKRANGE\PC-DEMO$

Service Information:
	Service Name:		krbtgt
	Service ID:		ATTACKRANGE\krbtgt

Network Information:
	Client Address:		::ffff:10.0.1.15
	Client Port:		59022

Additional Information:
	Ticket Options:		0x40800010
	Result Code:		0x0
	Ticket Encryption Type:	0x12
	Pre-Authentication Type:	2

Certificate Information:
	Certificate Issuer Name:		
	Certificate Serial Number:	
	Certificate Thumbprint:		 

 

Labels (1)
0 Karma
1 Solution

shivanshu1593
Builder

From the sample log, subject can contain the value "A Kerberos authentication ticket (TGT) was requested." and the field action should contain "success" if the value for the field Keywords is "Audit Success" and "failure" if the value for the field Keywords is "Audit Failure". This is a calculated field so if its not populating already, you can create easily via settings -> fields -> calculated fields.

Hope this helps.

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###

View solution in original post

shivanshu1593
Builder

From the sample log, subject can contain the value "A Kerberos authentication ticket (TGT) was requested." and the field action should contain "success" if the value for the field Keywords is "Audit Success" and "failure" if the value for the field Keywords is "Audit Failure". This is a calculated field so if its not populating already, you can create easily via settings -> fields -> calculated fields.

Hope this helps.

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###

syamaguchi3
Explorer

Thank you.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...