Skip to content

Latest commit

 

History

History
25 lines (23 loc) · 895 Bytes

pC_rsaecatcefalerttriggersuccessecatalert.md

File metadata and controls

25 lines (23 loc) · 895 Bytes

Parser Content

{
Name = rsa-ecat-cef-alert-trigger-success-ecatalert
  Vendor = RSA
  Product = RSA ECAT
  TimeFormat = "M/d/yyyy HH:mm:ss a"
  Conditions = [ """|RSA|RSA ECAT|""", """|EcatAlert|""" ]
  Fields = [
    """CEF([^\|]*\|){4}({alert_type}[^\|]+)""",
    """\sshost=({dest_host}.+?)\s+(\w+=|$)""",
    """\ssrc=({dest_ip}((([0-9a-fA-F.]{0,4}):{1,2}){1,7}([0-9a-fA-F]){1,4})|(((25[0-5]|(2[0-4]|1\d|[0-9]|)\d)\.?\b){4}))(:({dest_port}\d+))?""",
    """\sfname=({process_name}.+?)\s+(\w+=|$)""",
    """\sinstantIOCName =({alert_name}.+?)\s+(\w+=|$)""",
    """\smachineScore=({alert_severity}\d+)""",
    """\smoduleSignature=({additional_info}.+?)\s+(\w+=|$)""",
    """\sos=({threat_category}.+?)\s+(\w+=|$)""",
    """\stargetModule=({malware_url}.+?)\s+(\w+=|$)""",
  ]
  DupFields = [ "dest_host->host" , "malware_url->process_name"]
  ParserVersion = "v1.0.0"


}