Bez popisu

local_rules.xml 22KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312
  1. <group name="soc_mvp_test,">
  2. <!-- Base marker for all synthetic SOC simulation events -->
  3. <rule id="100200" level="3">
  4. <match>soc_mvp_test=true</match>
  5. <description>SOC MVP synthetic test event detected</description>
  6. <group>soc_mvp_test,syslog,</group>
  7. </rule>
  8. <!-- Proposal-level grouping -->
  9. <rule id="100210" level="5">
  10. <if_sid>100200</if_sid>
  11. <match>usecase_id=A</match>
  12. <description>Proposal Appendix A simulation event</description>
  13. <group>soc_mvp_test,proposal_appendix_a,</group>
  14. </rule>
  15. <rule id="100220" level="5">
  16. <if_sid>100200</if_sid>
  17. <match>usecase_id=B</match>
  18. <description>Proposal Appendix B simulation event</description>
  19. <group>soc_mvp_test,proposal_appendix_b,</group>
  20. </rule>
  21. <rule id="100230" level="5">
  22. <if_sid>100200</if_sid>
  23. <match>usecase_id=C</match>
  24. <description>Proposal Appendix C simulation event</description>
  25. <group>soc_mvp_test,proposal_appendix_c,</group>
  26. </rule>
  27. <!-- Appendix A1 (Medium) -->
  28. <rule id="100301" level="8"><if_sid>100210</if_sid><match>usecase_id=A1-01</match><description>A1-01 DNS Network Traffic Communicate to Malicious Domain</description><group>soc_mvp_test,appendix_a,a1,ioc,</group></rule>
  29. <rule id="100302" level="8"><if_sid>100210</if_sid><match>usecase_id=A1-02</match><description>A1-02 DNS Network Traffic Malicious Domain IOCs Detection</description><group>soc_mvp_test,appendix_a,a1,ioc,</group></rule>
  30. <!-- Appendix A2 (FortiGate IPS/IDS & Firewall) -->
  31. <rule id="100311" level="12"><if_sid>100210</if_sid><match>usecase_id=A2-01</match><description>A2-01 Allowed RDP from Public IPs</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  32. <rule id="100312" level="12"><if_sid>100210</if_sid><match>usecase_id=A2-02</match><description>A2-02 Firewall Account Admin Password Change</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  33. <rule id="100313" level="12"><if_sid>100210</if_sid><match>usecase_id=A2-03</match><description>A2-03 Firewall Account Create Add Admin Account</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  34. <rule id="100314" level="12"><if_sid>100210</if_sid><match>usecase_id=A2-04</match><description>A2-04 Firewall Configure Disabled Email Notification</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  35. <rule id="100315" level="5"><if_sid>100210</if_sid><match>usecase_id=A2-05</match><description>A2-05 Firewall Configure Download Configure FW</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  36. <rule id="100316" level="8"><if_sid>100210</if_sid><match>usecase_id=A2-06</match><description>A2-06 IDS Alert Multiple Critical High</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  37. <rule id="100317" level="5"><if_sid>100210</if_sid><match>usecase_id=A2-07</match><description>A2-07 Network Traffic Port Scanning</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  38. <rule id="100318" level="8"><if_sid>100210</if_sid><match>usecase_id=A2-08</match><description>A2-08 Network Traffic IOC Detection</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  39. <rule id="100319" level="8"><if_sid>100210</if_sid><match>usecase_id=A2-09</match><description>A2-09 Port Scanning from Private IP</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  40. <rule id="100320" level="8"><if_sid>100210</if_sid><match>usecase_id=A2-10</match><description>A2-10 Communicate to Malicious IP</description><group>soc_mvp_test,appendix_a,a2,fortigate,</group></rule>
  41. <!-- Appendix A3 (FortiGate VPN) -->
  42. <rule id="100331" level="12"><if_sid>100210</if_sid><match>usecase_id=A3-01</match><description>A3-01 VPN Authentication Success from Guest Account</description><group>soc_mvp_test,appendix_a,a3,vpn,</group></rule>
  43. <rule id="100332" level="12"><if_sid>100210</if_sid><match>usecase_id=A3-02</match><description>A3-02 VPN Authentication Success from Multiple Country</description><group>soc_mvp_test,appendix_a,a3,vpn,</group></rule>
  44. <rule id="100333" level="12"><if_sid>100210</if_sid><match>usecase_id=A3-03</match><description>A3-03 VPN Authentication Brute Force Success</description><group>soc_mvp_test,appendix_a,a3,vpn,</group></rule>
  45. <rule id="100334" level="5"><if_sid>100210</if_sid><match>usecase_id=A3-04</match><description>A3-04 VPN Authentication Multiple Fail Many Accounts from One Source</description><group>soc_mvp_test,appendix_a,a3,vpn,</group></rule>
  46. <rule id="100335" level="12"><if_sid>100210</if_sid><match>usecase_id=A3-05</match><description>A3-05 VPN Authentication Success from Outside Thailand</description><group>soc_mvp_test,appendix_a,a3,vpn,</group></rule>
  47. <!-- Appendix A4 (Windows/AD) -->
  48. <rule id="100341" level="8"><if_sid>100210</if_sid><match>usecase_id=A4-01</match><description>A4-01 Windows Authentication Multiple Fail from Privileged Account</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  49. <rule id="100342" level="8"><if_sid>100210</if_sid><match>usecase_id=A4-02</match><description>A4-02 Windows Authentication Multiple Fail from Service Account</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  50. <rule id="100343" level="8"><if_sid>100210</if_sid><match>usecase_id=A4-03</match><description>A4-03 Windows AD Enumeration with Malicious Tools</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  51. <rule id="100344" level="8"><if_sid>100210</if_sid><match>usecase_id=A4-04</match><description>A4-04 Windows Authentication Fail from Public IPs</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  52. <rule id="100345" level="8"><if_sid>100210</if_sid><match>usecase_id=A4-05</match><description>A4-05 Windows File Share Enumeration to Single Destination</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  53. <rule id="100346" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-06</match><description>A4-06 Windows Authentication Success from Public IPs</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  54. <rule id="100347" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-07</match><description>A4-07 Windows Authentication Privileged Account Impersonation</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  55. <rule id="100348" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-08</match><description>A4-08 Windows Authentication Successful Pass the Hash RDP</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  56. <rule id="100349" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-09</match><description>A4-09 Windows Authentication Success from Guest Account</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  57. <rule id="100350" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-10</match><description>A4-10 Windows Authentication Interactive Logon Success by Service Account</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  58. <rule id="100351" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-11</match><description>A4-11 Windows Account Added to Privileged Custom Group</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  59. <rule id="100352" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-12</match><description>A4-12 Windows Account Added to Privileged Group</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  60. <rule id="100353" level="12"><if_sid>100210</if_sid><match>usecase_id=A4-13</match><description>A4-13 Windows Domain Configure DSRM Password Reset</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  61. <rule id="100354" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-14</match><description>A4-14 Windows Authentication Multiple Fail One Account from Many Sources</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  62. <rule id="100355" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-15</match><description>A4-15 Windows Authentication Multiple Fail Many Accounts from One Source</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  63. <rule id="100356" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-16</match><description>A4-16 Windows Authentication Multiple Fail from Guest Account</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  64. <rule id="100357" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-17</match><description>A4-17 Windows Authentication Multiple Fail One Account from One Source</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  65. <rule id="100358" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-18</match><description>A4-18 Windows Authentication Multiple Interactive Logon Denied</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  66. <rule id="100359" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-19</match><description>A4-19 Windows Authentication Password Spray</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  67. <rule id="100360" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-20</match><description>A4-20 Windows Authentication Attempt from Disabled Account</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  68. <rule id="100361" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-21</match><description>A4-21 Windows Domain Account Created</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  69. <rule id="100362" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-22</match><description>A4-22 Windows Local Account Re Enabled</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  70. <rule id="100363" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-23</match><description>A4-23 Windows Local Account Created</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  71. <rule id="100364" level="5"><if_sid>100210</if_sid><match>usecase_id=A4-24</match><description>A4-24 Windows Domain Account Re Enabled</description><group>soc_mvp_test,appendix_a,a4,windows,</group></rule>
  72. <!-- Appendix B1 (VMware vCenter/ESXi) -->
  73. <rule id="100401" level="12"><if_sid>100220</if_sid><match>usecase_id=B1-01</match><description>B1-01 vCenter GUI Login Failed 5 Times and Success 1 Time</description><group>soc_mvp_test,appendix_b,b1,vmware,</group></rule>
  74. <rule id="100402" level="8"><if_sid>100220</if_sid><match>usecase_id=B1-02</match><description>B1-02 ESXi Enable SSH on Hosts</description><group>soc_mvp_test,appendix_b,b1,vmware,</group></rule>
  75. <rule id="100403" level="12"><if_sid>100220</if_sid><match>usecase_id=B1-03</match><description>B1-03 ESXi SSH Failed 5 Times and Success 1 Time</description><group>soc_mvp_test,appendix_b,b1,vmware,</group></rule>
  76. <!-- Appendix B2 (Log monitoring) -->
  77. <rule id="100411" level="5"><if_sid>100220</if_sid><match>usecase_id=B2-01</match><description>B2-01 Log Monitor Logs Loss Detection</description><group>soc_mvp_test,appendix_b,b2,logmonitor,</group></rule>
  78. <!-- Appendix B3 (Windows Sysmon) -->
  79. <rule id="100421" level="12"><if_sid>100220</if_sid><match>usecase_id=B3-01</match><description>B3-01 Sysmon LSASS Dumping</description><group>soc_mvp_test,appendix_b,b3,sysmon,</group></rule>
  80. <rule id="100422" level="12"><if_sid>100220</if_sid><match>usecase_id=B3-02</match><description>B3-02 Sysmon SQL Injection</description><group>soc_mvp_test,appendix_b,b3,sysmon,</group></rule>
  81. <rule id="100423" level="12"><if_sid>100220</if_sid><match>usecase_id=B3-03</match><description>B3-03 Sysmon Webshell</description><group>soc_mvp_test,appendix_b,b3,sysmon,</group></rule>
  82. <rule id="100424" level="12"><if_sid>100220</if_sid><match>usecase_id=B3-04</match><description>B3-04 Sysmon Uninstall</description><group>soc_mvp_test,appendix_b,b3,sysmon,</group></rule>
  83. <rule id="100425" level="12"><if_sid>100220</if_sid><match>usecase_id=B3-05</match><description>B3-05 Sysmon LSASS Dumping by Task Manager</description><group>soc_mvp_test,appendix_b,b3,sysmon,</group></rule>
  84. <rule id="100426" level="8"><if_sid>100220</if_sid><match>usecase_id=B3-06</match><description>B3-06 Sysmon CertUtil Download</description><group>soc_mvp_test,appendix_b,b3,sysmon,</group></rule>
  85. <!-- Appendix C1 (Impossible travel) -->
  86. <rule id="100501" level="12"><if_sid>100230</if_sid><match>usecase_id=C1-01</match><description>C1-01 Impossible Travel Detection</description><group>soc_mvp_test,appendix_c,c1,identity,</group></rule>
  87. <!-- Appendix C2 (Credential abuse & privilege misuse) -->
  88. <rule id="100511" level="12"><if_sid>100230</if_sid><match>usecase_id=C2-01</match><description>C2-01 Privileged Account Usage Outside Business Hours</description><group>soc_mvp_test,appendix_c,c2,identity,</group></rule>
  89. <rule id="100512" level="8"><if_sid>100230</if_sid><match>usecase_id=C2-02</match><description>C2-02 Dormant Account Activation</description><group>soc_mvp_test,appendix_c,c2,identity,</group></rule>
  90. <rule id="100513" level="12"><if_sid>100230</if_sid><match>usecase_id=C2-03</match><description>C2-03 Service Account Interactive Logon</description><group>soc_mvp_test,appendix_c,c2,identity,</group></rule>
  91. <rule id="100514" level="12"><if_sid>100230</if_sid><match>usecase_id=C2-04</match><description>C2-04 Rapid Privilege Escalation Followed by Sensitive Access</description><group>soc_mvp_test,appendix_c,c2,identity,</group></rule>
  92. <!-- Appendix C3 (Lateral movement & internal recon) -->
  93. <rule id="100521" level="12"><if_sid>100230</if_sid><match>usecase_id=C3-01</match><description>C3-01 Multiple Authentication Success Across Hosts</description><group>soc_mvp_test,appendix_c,c3,lateral_movement,</group></rule>
  94. <rule id="100522" level="12"><if_sid>100230</if_sid><match>usecase_id=C3-02</match><description>C3-02 SMB/RDP Lateral Burst Pattern</description><group>soc_mvp_test,appendix_c,c3,lateral_movement,</group></rule>
  95. <rule id="100523" level="12"><if_sid>100230</if_sid><match>usecase_id=C3-03</match><description>C3-03 Admin Account Accessing Many Servers Rapidly</description><group>soc_mvp_test,appendix_c,c3,lateral_movement,</group></rule>
  96. <rule id="100524" level="8"><if_sid>100230</if_sid><match>usecase_id=C3-04</match><description>C3-04 Internal Scanning / Enumeration Behavior</description><group>soc_mvp_test,appendix_c,c3,recon,</group></rule>
  97. <!-- ========================= -->
  98. <!-- Production profile rules -->
  99. <!-- ========================= -->
  100. <!--
  101. Production profile (second profile):
  102. - Does not depend on simulation marker fields (soc_mvp_test/usecase_id)
  103. - Uses source-like patterns that can appear in real logs
  104. - Rule IDs are separated from simulation profile in 110xxx range
  105. -->
  106. <rule id="110200" level="3">
  107. <description>SOC MVP production profile enabled</description>
  108. <group>soc_mvp_prod,baseline,</group>
  109. </rule>
  110. <!-- Appendix A1: DNS / Firewall IOC -->
  111. <rule id="110301" level="8">
  112. <decoded_as>soc-dns-ioc</decoded_as>
  113. <match>event_type=ioc_dns_traffic</match>
  114. <match>malicious.example</match>
  115. <description>A1 production: DNS query to malicious domain indicator</description>
  116. <group>soc_mvp_prod,appendix_a,a1,ioc,dns,</group>
  117. </rule>
  118. <rule id="110302" level="8">
  119. <decoded_as>soc-dns-ioc</decoded_as>
  120. <match>event_type=ioc_domain_match</match>
  121. <description>A1 production: DNS IOC domain match event</description>
  122. <group>soc_mvp_prod,appendix_a,a1,ioc,dns,</group>
  123. </rule>
  124. <!-- Appendix A2: FortiGate IPS/IDS & Firewall -->
  125. <rule id="110311" level="12">
  126. <match>vendor=fortinet</match>
  127. <match>dstport=3389</match>
  128. <match>action="accept"</match>
  129. <description>A2 production: FortiGate allowed RDP traffic detected</description>
  130. <group>soc_mvp_prod,appendix_a,a2,fortigate,</group>
  131. </rule>
  132. <rule id="110312" level="12">
  133. <match>vendor=fortinet</match>
  134. <match>action="password-change"</match>
  135. <description>A2 production: FortiGate admin password change</description>
  136. <group>soc_mvp_prod,appendix_a,a2,fortigate,</group>
  137. </rule>
  138. <rule id="110313" level="12">
  139. <match>vendor=fortinet</match>
  140. <match>action="create-admin"</match>
  141. <description>A2 production: FortiGate admin account creation</description>
  142. <group>soc_mvp_prod,appendix_a,a2,fortigate,</group>
  143. </rule>
  144. <rule id="110314" level="12">
  145. <match>vendor=fortinet</match>
  146. <match>action="disable-email-notification"</match>
  147. <description>A2 production: FortiGate email notification disabled</description>
  148. <group>soc_mvp_prod,appendix_a,a2,fortigate,</group>
  149. </rule>
  150. <rule id="110315" level="5">
  151. <match>vendor=fortinet</match>
  152. <match>action="download-config"</match>
  153. <description>A2 production: FortiGate configuration download</description>
  154. <group>soc_mvp_prod,appendix_a,a2,fortigate,</group>
  155. </rule>
  156. <rule id="110316" level="8">
  157. <match>vendor=fortinet</match>
  158. <match>subtype="ips"</match>
  159. <match>severity="critical"</match>
  160. <description>A2 production: FortiGate critical IPS alert</description>
  161. <group>soc_mvp_prod,appendix_a,a2,fortigate,ips,</group>
  162. </rule>
  163. <rule id="110317" level="5">
  164. <match>vendor=fortinet</match>
  165. <match>event_type=port_scan</match>
  166. <description>A2 production: FortiGate port scanning indicator</description>
  167. <group>soc_mvp_prod,appendix_a,a2,fortigate,recon,</group>
  168. </rule>
  169. <rule id="110318" level="8">
  170. <match>vendor=fortinet</match>
  171. <match>event_type=ioc_detection</match>
  172. <description>A2 production: FortiGate IOC detection event</description>
  173. <group>soc_mvp_prod,appendix_a,a2,fortigate,ioc,</group>
  174. </rule>
  175. <rule id="110320" level="8">
  176. <match>vendor=fortinet</match>
  177. <match>event_type=malicious_ip_communication</match>
  178. <description>A2 production: Communication to malicious IP detected</description>
  179. <group>soc_mvp_prod,appendix_a,a2,fortigate,ioc,</group>
  180. </rule>
  181. <!-- Appendix A3: FortiGate VPN -->
  182. <rule id="110331" level="12">
  183. <match>subtype="vpn"</match>
  184. <match>success=true</match>
  185. <match>guest</match>
  186. <description>A3 production: VPN success by guest account</description>
  187. <group>soc_mvp_prod,appendix_a,a3,vpn,</group>
  188. </rule>
  189. <rule id="110333" level="12">
  190. <match>subtype="vpn"</match>
  191. <match>event_type=vpn_bruteforce_success</match>
  192. <description>A3 production: VPN brute-force success indicator</description>
  193. <group>soc_mvp_prod,appendix_a,a3,vpn,</group>
  194. </rule>
  195. <rule id="110335" level="12">
  196. <match>subtype="vpn"</match>
  197. <match>success=true</match>
  198. <match>country=</match>
  199. <description>A3 production: VPN success with country context (geo-anomaly candidate)</description>
  200. <group>soc_mvp_prod,appendix_a,a3,vpn,geo,</group>
  201. </rule>
  202. <!-- Appendix A4: Windows / Active Directory -->
  203. <rule id="110341" level="8">
  204. <match>source=windows</match>
  205. <match>event_id=4625</match>
  206. <match>is_admin=true</match>
  207. <description>A4 production: Privileged account authentication failures</description>
  208. <group>soc_mvp_prod,appendix_a,a4,windows,auth_fail,</group>
  209. </rule>
  210. <rule id="110342" level="8">
  211. <match>source=windows</match>
  212. <match>event_id=4625</match>
  213. <match>is_service=true</match>
  214. <description>A4 production: Service account authentication failures</description>
  215. <group>soc_mvp_prod,appendix_a,a4,windows,auth_fail,</group>
  216. </rule>
  217. <rule id="110346" level="12">
  218. <match>source=windows</match>
  219. <match>event_id=4624</match>
  220. <match>src_ip=</match>
  221. <description>A4 production: Windows successful authentication with source IP context</description>
  222. <group>soc_mvp_prod,appendix_a,a4,windows,auth_success,</group>
  223. </rule>
  224. <rule id="110352" level="12">
  225. <match>source=windows</match>
  226. <match>event_id=4728</match>
  227. <match>target_group=</match>
  228. <description>A4 production: Account added to privileged group (domain scope)</description>
  229. <group>soc_mvp_prod,appendix_a,a4,windows,privilege,</group>
  230. </rule>
  231. <rule id="110353" level="12">
  232. <match>source=windows</match>
  233. <match>event_id=4732</match>
  234. <match>target_group=</match>
  235. <description>A4 production: Account added to privileged group (local scope)</description>
  236. <group>soc_mvp_prod,appendix_a,a4,windows,privilege,</group>
  237. </rule>
  238. <!-- Appendix B1: VMware -->
  239. <rule id="110401" level="12">
  240. <decoded_as>soc-vmware-auth</decoded_as>
  241. <match>event_type=vmware_</match>
  242. <match>_fail_success</match>
  243. <description>B1 production: vCenter login burst pattern</description>
  244. <group>soc_mvp_prod,appendix_b,b1,vmware,</group>
  245. </rule>
  246. <rule id="110402" level="8">
  247. <decoded_as>soc-vmware-auth</decoded_as>
  248. <match>event_type=vmware_esxi_enable_ssh</match>
  249. <description>B1 production: ESXi SSH enabled</description>
  250. <group>soc_mvp_prod,appendix_b,b1,vmware,</group>
  251. </rule>
  252. <!-- Appendix B2: Log monitoring -->
  253. <rule id="110411" level="5">
  254. <decoded_as>soc-log-monitor</decoded_as>
  255. <match>event_type=log_loss_detection</match>
  256. <match>missing_stream=</match>
  257. <description>B2 production: Log loss detection signal</description>
  258. <group>soc_mvp_prod,appendix_b,b2,logmonitor,</group>
  259. </rule>
  260. <!-- Appendix B3: Sysmon -->
  261. <rule id="110421" level="12">
  262. <decoded_as>soc-windows-sysmon</decoded_as>
  263. <match>target_process=lsass.exe</match>
  264. <description>B3 production: LSASS dump behavior</description>
  265. <group>soc_mvp_prod,appendix_b,b3,sysmon,credential_access,</group>
  266. </rule>
  267. <rule id="110426" level="8">
  268. <decoded_as>soc-windows-sysmon</decoded_as>
  269. <match>process=certutil.exe</match>
  270. <description>B3 production: CertUtil download pattern</description>
  271. <group>soc_mvp_prod,appendix_b,b3,sysmon,</group>
  272. </rule>
  273. <!-- Appendix C1-C3: future enhancement (production-prep heuristics) -->
  274. <rule id="110501" level="12">
  275. <match>event_type=c1_impossible_travel</match>
  276. <description>C1 production: Impossible travel correlated event</description>
  277. <group>soc_mvp_prod,appendix_c,c1,identity,</group>
  278. </rule>
  279. <rule id="110511" level="12">
  280. <match>event_type=c2_credential_abuse</match>
  281. <description>C2 production: Credential abuse correlated event</description>
  282. <group>soc_mvp_prod,appendix_c,c2,identity,</group>
  283. </rule>
  284. <rule id="110521" level="12">
  285. <match>event_type=c3_lateral_movement</match>
  286. <description>C3 production: Lateral movement correlated event</description>
  287. <group>soc_mvp_prod,appendix_c,c3,lateral_movement,</group>
  288. </rule>
  289. </group>