Closed gs3cl closed 1 year ago
@thomaspatzke I tried again with new version 1.0.3 (https://github.com/SigmaHQ/pySigma-backend-splunk/pull/21) also not working could you please take look into this ?
same with new converter: https://sigconverter.io/
sigma-cli-py3.10) root@csi:/opt/sigma-cli# sigma convert -t splunk -p splunk_cim Rule_test/proc_creation_win_adplus_memory_dump.yml
Parsing Sigma rules [####################################] 100%
Error while conversion: The Splunk Data Model Sigma backend supports only the following fields for process_creation log source: CommandLine,Computer,CurrentDirectory,Image,IntegrityLevel,ParentCommandLine,ParentImage,ParentProcessGuid,ParentProcessId,ProcessGuid,ProcessId,User
Thanks in advance
Please re-install the Splunk backend or the virtual Python environment. Just done this from a fresh env and it works:
$ sigma convert -t splunk -p splunk_cim C:\Users\thoma\OneDrive\Devel\sigma\rules\windows\process_creation\proc_creation_win_certutil_encode.yml
Processes.process_path="*\\certutil.exe" OR Processes.original_file_name="CertUtil.exe" Processes.process IN ("*-encode*", "*/encode*")
Hey Thomas, yes it works now thanks!
Hey,
At the current Stage you get an error when trying to onvert to splunk cim due to missing field: OriginalFileName like here with sigmaio:
or with sigma-cli
Could you please add this into the backend ?
OriginalFileName -> Processes.original_file_name
Reference for Rule Example: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_adplus_memory_dump.yml
Splunk CIM for the field: https://docs.splunk.com/Documentation/CIM/5.1.1/User/Endpoint
At the end the search should be look like this
Regards,