-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fields are not renamed to follow CIM #12
Comments
Which fields are you missing? For almost all the splunk apps and add-one I develop I try to extract the fields used by enterprise security as much as it's available in the data I have access. If you do have some data that has data that could be mapped to the malware CIM datamodel can you post here so I can have a look? |
username field not aliased to user which is used in datamodel |
The file path is extracted as file_path in the add-on. So that extraction you're seeing is not coming from the add-on. Can you share some sample events where you are being this happening? |
I see many of the fields are not mapped with Malware Datamodel.
The text was updated successfully, but these errors were encountered: