XML
XML Match Rules are designed for detecting threats or patterns within structured data sources that use XML formatting. This rule type is ideal for processing feeds, form submissions, third-party alerts, and content with hierarchical tagging such as threat reports, leak disclosures, or machine-readable submissions.
These rules allow analysts to define precise conditions over specific XML nodes, attributes, or values. They support regular expressions (regex) for flexible pattern matching within content and provide fine-grained control over structured data inspection.
Rule Structure
Each XML rule includes:
Target Element(s) The XML node or attribute to inspect (e.g.,
<email>
,<domain>
,@type
)Condition Logic defining what should be matched. Conditions can include:
Exact value match
Partial string match
Regex match
Severity Optional impact classification (
low
,medium
,high
)
Regex Support
Regex can be used to:
Identify email domains, credential patterns, or encoded values
Detect naming conventions in tags or attributes
Match variations in formatting across data sources
Regex is defined inside <condition>
and supports common expressions such as:
<rule>
<condition regex=".*unauthorized\s+access.*" />
<severity>high</severity>
</rule>
Use Cases
Flag indicators in external CTI feeds
Match credentials or tokens in structured breach dumps
Detect abuse types in standardized incident formats (e.g., STIX, TAXII)
Monitor custom fields in partner submissions or open disclosure reports
Incident Triggering
When an XML Match Rule finds a match in newly ingested structured content, the result is classified and enriched. If it meets the predefined criteria, it triggers an incident in the Response module automatically.
Last updated