Good day. I have a rule that I made related to 0695-f5_rules.xml where I have made a custom rule file of. The rule is as follows:
<group name="f5-bigip-cef,">
<!-- CEF decoded grouped rules -->
<rule id="65293" level="0">
<decoded_as>f5-bigip-cef</decoded_as>
<description>F5 BigIP CEF decoded grouped alerts</description>
</rule>
<!-- ASM Violations -->
<rule id="65296" level="6">
<if_sid>65293</if_sid>
<match>cs4Label=attack_type</match>
<field name="attack" type="pcre2">^(?!^N\/A$|^$).*</field>
<field name="violation.rating" type="pcre2">^(4|5)$</field>
<description>F5 BigIP ASM: Violation detected level $(violation.rating)</description>
</rule>
<rule id="165299" level="2">
<if_sid>65293</if_sid>
<match>cs4Label=attack_type</match>
<field name="attack" type="pcre2">^(?!^N\/A$|^$).*</field>
<field name="violation.rating" type="pcre2">^(0|1|2|3)$</field>
<description>F5 BigIP ASM: Violation detected level $(violation.rating)</description>
</rule>
<rule id="165296" level="12">
<if_sid>65296</if_sid>
<field name="http.status" type="pcre2">^2</field>
<description>F5 BigIP ASM: Successful attack detected level $(violation.rating)</description>
<mitre>
<id>T1190</id>
</mitre>
<group>attack,pci_dss_6.5,pci_dss_11.4,gdpr_IV_35.7.d,nist_800_53_SA.11,nist_800_53_SI.4,tsc_CC6.6,tsc_CC7.1,tsc_CC8.1,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
</rule>
<!-- ASM Illegal action -->
<rule id="65294" level="6">
<if_sid>65296</if_sid>
<field name="type">Illegal</field>
<description>F5 BigIP ASM: Illegal action detected level $(violation.rating)</description>
</rule>
<rule id="165294" level="12">
<if_sid>65294</if_sid>
<field name="http.status" type="pcre2">^2</field>
<description>F5 BigIP ASM: Successful Illegal action detected level $(violation.rating)</description>
<mitre>
<id>T1190</id>
</mitre>
<group>attack,pci_dss_6.5,pci_dss_11.4,gdpr_IV_35.7.d,nist_800_53_SA.11,nist_800_53_SI.4,tsc_CC6.6,tsc_CC7.1,tsc_CC8.1,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
</rule>
<!-- ASM sql injection -->
<rule id="65295" level="6">
<if_sid>65296</if_sid>
<field name="attack">SQL-Injection</field>
<description>F5 BigIP ASM: SQL injection detected level $(violation.rating)</description>
<mitre>
<id>T1190</id>
</mitre>
</rule>
<rule id="165295" level="13">
<if_sid>65295</if_sid>
<field name="http.status" type="pcre2">^2</field>
<description>F5 BigIP ASM: Successful SQL injection detected level $(violation.rating)</description>
<mitre>
<id>T1190</id>
</mitre>
<group>attack,pci_dss_6.5,pci_dss_11.4,gdpr_IV_35.7.d,nist_800_53_SA.11,nist_800_53_SI.4,tsc_CC6.6,tsc_CC7.1,tsc_CC8.1,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
</rule>
<!-- ASM Anomaly -->
<rule id="65297" level="6">
<if_sid>65293</if_sid>
<match>cn3Label=attack_id</match>
<field name="cn3" type="pcre2">^(?!^N\/A$|^$).*</field>
<description>F5 BigIP ASM: Anomaly detected, attack_id is $(cn3), status is $(attack)</description>
</rule>
<rule id="165297" level="12">
<if_sid>65297</if_sid>
<field name="http.status" type="pcre2">^2</field>
<description>F5 BigIP ASM: Successful Anomaly detected, attack_id is $(cn3), status is $(attack)</description>
<mitre>
<id>T1190</id>
</mitre>
<group>attack,pci_dss_6.5,pci_dss_11.4,gdpr_IV_35.7.d,nist_800_53_SA.11,nist_800_53_SI.4,tsc_CC6.6,tsc_CC7.1,tsc_CC8.1,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
</rule>
<rule id="165298" level="10" timeframe="120" frequency="5" ignore="240">
<if_matched_group>f5-bigip-cef</if_matched_group>
<if_level>2</if_level>
<same_srcip />
<description>F5 BigIP ASM: Multiple attack signatures from $(srcip)</description>
<group>pci_dss_6.5,pci_dss_11.4,gdpr_IV_35.7.d,nist_800_53_SA.11,nist_800_53_SI.4,tsc_CC6.6,tsc_CC7.1,tsc_CC8.1,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
<mitre>
<id>T1498</id>
</mitre>
</rule>
</group>