Açıklama Yok

soc-a4-windows-ad-rules.xml 5.8KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. <!--
  2. SOC Proposal Rules — Appendix A4: Windows / Active Directory
  3. Simulation profile rule IDs : 100341-100364
  4. Production profile rule IDs : 110341-110364
  5. Production rules use specific built-in Wazuh rule SIDs as parents
  6. to avoid the N×M rule-tree explosion from if_group=windows:
  7. 60105/60122 → event 4625 (auth failure)
  8. 60106 → event 4624 (auth success / logon)
  9. 60109 → events 4720/4722 (account create/enable)
  10. 60113 → events 4728/4732 (group membership change)
  11. 67027 → event 4688 (new process created)
  12. 60103 → event 4794 (DSRM password set)
  13. -->
  14. <group name="soc_mvp,appendix_a,a4,windows,">
  15. <!-- ── Simulation profile ── -->
  16. <!-- ── Production profile ──
  17. Parents are specific built-in Wazuh SIDs (not if_group=windows) to
  18. avoid N×M rule-tree explosion. Each parent fires for one event ID.
  19. -->
  20. <!-- A4-01/02/19: Auth failures (event 4625)
  21. Parent: 60105 (4625 base), 60122 (4625 variant) -->
  22. <rule id="110341" level="8">
  23. <if_sid>60105, 60122</if_sid>
  24. <field name="win.eventdata.targetUserName" type="pcre2">(?i)admin</field>
  25. <description>A4-01 [PROD] Windows: privileged account name auth failure (4625)</description>
  26. <group>soc_prod,a4,auth_fail,</group>
  27. <mitre><id>T1110.001</id></mitre>
  28. </rule>
  29. <rule id="110342" level="8">
  30. <if_sid>60105, 60122</if_sid>
  31. <field name="win.eventdata.targetUserName" type="pcre2">(?i)svc|service|\$$</field>
  32. <description>A4-02 [PROD] Windows: service account auth failure (4625)</description>
  33. <group>soc_prod,a4,auth_fail,</group>
  34. <mitre><id>T1110.001</id></mitre>
  35. </rule>
  36. <rule id="110359" level="5">
  37. <if_sid>60105, 60122</if_sid>
  38. <description>A4-19 [PROD] Windows: authentication failure (4625)</description>
  39. <group>soc_prod,a4,spray,</group>
  40. <mitre><id>T1110.003</id></mitre>
  41. </rule>
  42. <!-- A4-03: AD enumeration via process execution (event 4688)
  43. Parent: 67027 (new process created) -->
  44. <rule id="110343" level="8">
  45. <if_sid>67027</if_sid>
  46. <field name="win.eventdata.newProcessName" type="pcre2">(?i)adfind\.exe</field>
  47. <description>A4-03 [PROD] Windows AD: adfind enumeration tool executed (4688)</description>
  48. <group>soc_prod,a4,ad_enum,</group>
  49. <mitre><id>T1087.002</id></mitre>
  50. </rule>
  51. <!-- A4-06/07/08/09/10: Auth successes (event 4624)
  52. Parent: 60106 (logon success) -->
  53. <rule id="110346" level="12">
  54. <if_sid>60106</if_sid>
  55. <field name="win.eventdata.logonType">^10$</field>
  56. <description>A4-06 [PROD] Windows: remote interactive auth success logon type 10 (4624)</description>
  57. <group>soc_prod,a4,auth_success,remote,</group>
  58. <mitre><id>T1021.001</id></mitre>
  59. <mitre><id>T1078</id></mitre>
  60. </rule>
  61. <rule id="110348" level="12">
  62. <if_sid>60106</if_sid>
  63. <field name="win.eventdata.authenticationPackageName">NTLM</field>
  64. <field name="win.eventdata.logonType">^3$</field>
  65. <description>A4-08 [PROD] Windows: NTLM network logon type 3 — pass-the-hash indicator (4624)</description>
  66. <group>soc_prod,a4,pth,</group>
  67. <mitre><id>T1550.002</id></mitre>
  68. </rule>
  69. <rule id="110349" level="12">
  70. <if_sid>60106</if_sid>
  71. <field name="win.eventdata.targetUserName" type="pcre2">(?i)^guest$</field>
  72. <description>A4-09 [PROD] Windows: guest account auth success (4624)</description>
  73. <group>soc_prod,a4,auth_success,guest,</group>
  74. <mitre><id>T1078.001</id></mitre>
  75. </rule>
  76. <rule id="110350" level="12">
  77. <if_sid>60106</if_sid>
  78. <field name="win.eventdata.logonType">^2$</field>
  79. <field name="win.eventdata.targetUserName" type="pcre2">(?i)svc|service|\$$</field>
  80. <description>A4-10 [PROD] Windows: service account interactive logon type 2 (4624)</description>
  81. <group>soc_prod,a4,service_account,</group>
  82. <mitre><id>T1078.003</id></mitre>
  83. </rule>
  84. <!-- A4-11/12: Group membership changes (events 4728/4732)
  85. Parent: 60113 (member added to security-enabled group) -->
  86. <rule id="110352" level="12">
  87. <if_sid>60113</if_sid>
  88. <field name="win.system.eventID">^4728$</field>
  89. <description>A4-12 [PROD] Windows: account added to privileged domain group (4728)</description>
  90. <group>soc_prod,a4,privilege_escalation,</group>
  91. <mitre><id>T1098.007</id></mitre>
  92. </rule>
  93. <rule id="110353" level="12">
  94. <if_sid>60113</if_sid>
  95. <field name="win.system.eventID">^4732$</field>
  96. <description>A4-11 [PROD] Windows: account added to privileged local group (4732)</description>
  97. <group>soc_prod,a4,privilege_escalation,</group>
  98. <mitre><id>T1098.007</id></mitre>
  99. </rule>
  100. <!-- A4-13: DSRM password set (event 4794)
  101. Parent: 60103 (Windows audit success event — must constrain to eventID 4794) -->
  102. <rule id="110354" level="12">
  103. <if_sid>60103</if_sid>
  104. <field name="win.system.eventID">^4794$</field>
  105. <description>A4-13 [PROD] Windows DC: DSRM account password set (4794)</description>
  106. <group>soc_prod,a4,persistence,</group>
  107. <mitre><id>T1098</id></mitre>
  108. </rule>
  109. <!-- A4-21/22/23/24: Account lifecycle (events 4720/4722)
  110. Parent: 60109 (account created/enabled) -->
  111. <rule id="110361" level="5">
  112. <if_sid>60109</if_sid>
  113. <field name="win.system.eventID">^4720$</field>
  114. <description>A4-21/23 [PROD] Windows: new user account created (4720)</description>
  115. <group>soc_prod,a4,account_create,</group>
  116. <mitre><id>T1136</id></mitre>
  117. </rule>
  118. <rule id="110362" level="5">
  119. <if_sid>60109</if_sid>
  120. <field name="win.system.eventID">^4722$</field>
  121. <description>A4-22/24 [PROD] Windows: user account re-enabled (4722)</description>
  122. <group>soc_prod,a4,account_lifecycle,</group>
  123. <mitre><id>T1078</id></mitre>
  124. </rule>
  125. <!-- ── Production normalized key=value path (soc-mvp production profile) ── -->
  126. </group>