Hi, sorry for disturbing. I'm also following the same blog, but i'm not so advanced.
"md5" is the value he added to the key.
How $(file)? where did that come from?
I went to the decoder 0015-ossec_rules.xml and looked for 554
From the blog:
=============
<group name="local,malware,">
<rule id="100002" level="5">
<list field="md5" lookup="match_key">etc/lists/malware-hashes</list>
<description>A file - $(file) - in the malware blacklist was added to the system.</description>
<rule id="100003" level="5">
<field name="file" type="pcre2">(?i)[c-z]:</field>
<description>A file - $(file) - in the malware blacklist was added to the system.</description>
From 0015-ossec_rules.xml :
========================
<rule id="554" level="5">
<category>ossec</category>
<decoded_as>syscheck_new_entry</decoded_as>
<description>File added to the system.</description>
<group>syscheck,syscheck_entry_added,syscheck_file,pci_dss_11.5,gpg13_4.11,gdpr_II_5.1.f,hipaa_164.312.c.1,hipaa_164.312.c.2,nist_800_53_SI.7,tsc_PI1.4,tsc_PI1.5,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
</rule>
I can see that the decoder used is called "syscheck_new_entry".
"But I can't find the decoder called "syscheck_new_entry"
Can someone help explain where to extract $(file) or the blog?
Thanks!