Correlation rules in UTMStack are defined frameworks aiding analysts in detecting network threats
cache -> [allOf | oneOf] -> fieldThe field on which the comparison will be applied. A field is a series of keys separated by dots. It can contain special wildcard characters ’*’ and ’?’. To access a slice value, use the index as the key. To get the number of elements in a slice or to access a child path, use the ’#’ character. Dot and wildcard characters can be escaped with ’\’. You can also query a slice for the first match using # (…), or find all matches with # (…) #. You can use the comparison operators
(==,!=, <, <=,>,>=)
and the simple pattern matching operators (% and !%)
.
This description also applies to \[cache | search\] -> save -> field
cache -> [allOf | oneOf] -> operatorOperator to use in the comparison. See information about the operators in Operators
cache -> [allOf | oneOf] -> valueValue to compare the content of “cache -> [allOf | oneOf] -> field”. In the second iteration case or onwards, you can use an alias to use the content of that alias as a value.
cache -> timeLapseHow much time backward in seconds will be checked in the logs.
[cache | search] -> minCountHow many minimum logs must be obtained as a result for this rule to be met.
[cache | search] -> saveRequired fields to save to use in the next cycle iteration or to complete the information of the alerts.
[cache | search] -> save -> fieldThe original name of the field to store.
[cache | search] -> save -> aliasThe alias or name to access the field. There cannot be two or more aliases with the same name within the same iteration. In the last iteration, the system will use the following aliases to fill in the alert details:
**!= y <>**
It’s true if the field’s content is unequal to “value” content. It is sensitive to capital letters.
<
\>
<=
\>=