Closed adel-akloul-mox closed 1 year ago
@SamuelHassine happy to hear how you receive the idea before I implement the change
Hello @adel-akloul-mox,
Fully agree with all the proposed changes.
Kind regards, Samuel
PR for your review: https://github.com/OpenCTI-Platform/connectors/pull/1407
Use case
Given the below STIX sent to a Splunk KVSTORE, note the presence of an UUID to fields such as
extensions--UUID
Issues:
extensions.extension-definition--*.[labels, score, created_at, updated_at]
cannot be extracted via a splunkLookup Definition
Current Workaround
Proposed Solution
My proposed solution is to amend connector-splunk so that it changes the payload format in a more KVstore-friendly manner as it streams it to Splunk. The proposed payload will looks like:
On top of that, I propose to modify the SPLUNK_IGNORE_TYPES environment variable since apart domains, ipv4, ipv6, url and hashes, all other STIX objects are not so relevant for threat hunting:
Benefits of such a changes:
extensions--UUID
Additional Information
Similar transformation would be made for type:
For
type: "file"
, I propose further changes to normalize the format by replacing the type with the actual hash-type:instead of
Would you be willing to submit a PR?