pfsense_2023.json 3.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. {
  2. "extractors": [
  3. {
  4. "title": "pfSense filterlog: IPv4 ICMP",
  5. "extractor_type": "regex",
  6. "converters": [],
  7. "order": 0,
  8. "cursor_strategy": "copy",
  9. "source_field": "message",
  10. "target_field": "FilterData",
  11. "extractor_config": {
  12. "regex_value": "^filterlog\\[.+\\]:(.+)"
  13. },
  14. "condition_type": "regex",
  15. "condition_value": "^filterlog\\[.+\\]:(.+),(in|out),4,.*,icmp,.*$"
  16. },
  17. {
  18. "title": "pfSense filterlog: IPv4 UDP",
  19. "extractor_type": "regex",
  20. "converters": [
  21. {
  22. "type": "csv",
  23. "config": {
  24. "trim_leading_whitespace": false,
  25. "column_header": "RuleNumber,SubRuleNumber,Anchor,Tracker,Interface,Reason,Action,Direction,IPVersion,TOS,ECN,TTL,ID,Offset,Flags,ProtocolID,Protocol,Length,SourceIP,DestIP,SourcePort,DestPort,DataLength",
  26. "strict_quotes": false
  27. }
  28. }
  29. ],
  30. "order": 2,
  31. "cursor_strategy": "copy",
  32. "source_field": "message",
  33. "target_field": "FilterData",
  34. "extractor_config": {
  35. "regex_value": "^filterlog\\[.+\\]:(.+)"
  36. },
  37. "condition_type": "regex",
  38. "condition_value": "^filterlog\\[.+\\]:(.+),(in|out),4,.*,udp,.*$"
  39. },
  40. {
  41. "title": "pfSense filterlog: IPv4 TCP",
  42. "extractor_type": "regex",
  43. "converters": [
  44. {
  45. "type": "csv",
  46. "config": {
  47. "trim_leading_whitespace": false,
  48. "column_header": "RuleNumber,SubRuleNumber,Anchor,Tracker,Interface,Reason,Action,Direction,IPVersion,TOS,ECN,TTL,ID,Offset,Flags,ProtocolID,Protocol,Length,SourceIP,DestIP,SourcePort,DestPort,DataLength,TCPFlags,Sequence,ACK,Window,URG,Options",
  49. "strict_quotes": false
  50. }
  51. }
  52. ],
  53. "order": 1,
  54. "cursor_strategy": "copy",
  55. "source_field": "message",
  56. "target_field": "FilterData",
  57. "extractor_config": {
  58. "regex_value": "^filterlog\\[.+\\]:(.+)"
  59. },
  60. "condition_type": "regex",
  61. "condition_value": "^filterlog\\[.+\\]:(.+),(in|out),4,.*,tcp,.*$"
  62. },
  63. {
  64. "title": "pfsense OpenVPN",
  65. "extractor_type": "grok",
  66. "converters": [],
  67. "order": 0,
  68. "cursor_strategy": "copy",
  69. "source_field": "message",
  70. "target_field": "",
  71. "extractor_config": {
  72. "grok_pattern": "^openvpn\\[%{NUMBER:openvpn_pid}\\]: %{IP:client_ip}:%{NUMBER:client_port} \\[%{DATA:client_username}\\] Peer Connection Initiated with \\[AF_INET\\]%{IP:target_ip}:%{NUMBER:target_port} \\(via \\[AF_INET\\]%{IP:via_ip}%\\)",
  73. "named_captures_only": true
  74. },
  75. "condition_type": "string",
  76. "condition_value": "openvpn"
  77. },
  78. {
  79. "title": "Suricata alerts",
  80. "extractor_type": "grok",
  81. "converters": [],
  82. "order": 0,
  83. "cursor_strategy": "copy",
  84. "source_field": "message",
  85. "target_field": "",
  86. "extractor_config": {
  87. "grok_pattern": "%{DATA:process}\\[%{INT:process_id}\\]: \\[%{INT:rule_id}:%{INT:rev_id}:%{INT:sig_id}\\] %{DATA:alert_msg} \\[Classification: %{DATA:classification}\\] \\[Priority: %{INT:priority}\\] \\{%{WORD:protocol}\\} %{IP:src_ip}:%{INT:src_port} -> %{IP:dst_ip}:%{INT:dst_port}"
  88. },
  89. "condition_type": "string",
  90. "condition_value": "suricata"
  91. }
  92. ],
  93. "version": "5.0.7"
  94. }