Açıklama Yok

summary_rule_match.md 8.5KB

Wazuh Rule Match Summary — SOC Proposal Appendices A / B / C

Query window: 2026-03-17 (today only) Total events matched across all SOC custom rules: 286,931 Data source: OpenSearch index wazuh-alerts-* (filter: rule.groups: soc_prod*)


Appendix A — Threat Detection (FortiGate + Windows/AD)

A1 — DNS / Firewall IOC (file: soc-a1-ioc-rules.xml)

Rule ID Use Case Description MITRE Events
110301 A1-01 DNS query to malicious domain (IOC traffic indicator) T1071.004 0
110302 A1-02 DNS IOC domain match from threat intelligence feed T1568 0

A2 — FortiGate IPS/IDS & Firewall (file: soc-a2-fortigate-fw-rules.xml)

Rule ID Use Case Description MITRE Events
110311 A2-01 FortiGate: RDP (3389) traffic allowed T1021.001 0
110312 A2-02 FortiGate: admin account password changed T1098 0
110313 A2-03 FortiGate: new admin account created T1136 0
110314 A2-04 FortiGate: alerting/notification disabled via config change T1562 0
110315 A2-05 FortiGate: firewall configuration file downloaded T1005 0
110316 A2-06 FortiGate IPS: multiple critical signatures triggered T1595 0
110317 A2-07 FortiGate: TCP port scan from external IP T1046 0
110318 A2-08 FortiGate IPS: IOC-based IP indicator detected T1071.001 0
110319 A2-09 FortiGate: internal port scan from private source IP T1046 0
110320 A2-10 FortiGate: traffic to known C2/malicious IP allowed T1071.001 0

A3 — FortiGate VPN (file: soc-a3-fortigate-vpn-rules.xml)

Rule ID Use Case Description MITRE Events
110331 A3-01 VPN authentication success by guest account T1078.001 0
110332 A3-02 VPN success from different country than last login T1078 0
110333 A3-03 VPN success after multiple prior failures (brute-force indicator) T1110.001 0
110334 A3-04 VPN multiple account failures from single source IP T1110.003 0
110335 A3-05 VPN authentication success from outside Thailand T1078 0

Note: A3 rules require FortiGate VPN syslogs (if_group=fortigate) with action=ssl-login-* events. No matching events today — VPN logs are not yet being forwarded to Wazuh.


A4 — Windows / Active Directory (file: soc-a4-windows-ad-rules.xml)

Rule ID Use Case Description MITRE Events
110341 A4-01 Windows: privileged account name auth failure (4625) T1110.001 1
110342 A4-02 Windows: service account auth failure (4625) T1110.001 46
110343 A4-03 Windows AD: adfind enumeration tool executed (4688) T1087.002 0
110346 A4-06 Windows: remote interactive auth success logon type 10 (4624) T1021.001, T1078 0
110348 A4-08 Windows: NTLM network logon type 3 — pass-the-hash indicator (4624) T1550.002 0
110349 A4-09 Windows: guest account auth success (4624) T1078.001 0
110350 A4-10 Windows: service account interactive logon type 2 (4624) T1078.003 0
110352 A4-12 Windows: account added to privileged domain group (4728) T1098.007 0
110353 A4-11 Windows: account added to privileged local group (4732) T1098.007 0
110354 A4-13 Windows DC: DSRM account password set (4794) T1098 285,769 ⚠️
110359 A4-19 Windows: authentication failure (4625) T1110.003 55
110361 A4-21/23 Windows: new user account created (4720) T1136 0
110362 A4-22/24 Windows: user account re-enabled (4722) T1078 0

⚠️ Rule 110354 (DSRM password set / event 4794) accounts for 285,769 of all events today — 99.6% of total volume. The parent rule is 60103 which fires on Windows Event ID 4794. The extremely high count warrants investigation: confirm whether these are genuine DSRM events or if the parent SID 60103 is matching a broader event set than intended.

Note: A4-04, A4-05, A4-07, A4-14 through A4-18, A4-20 have no production rules implemented.


Appendix B — Expanded Monitoring

B1 — VMware vCenter / ESXi (file: soc-b1-vmware-rules.xml)

Rule ID Use Case Description MITRE Events
110401 B1-01 vCenter: login failure detected (brute-force indicator) T1110 0
110402 B1-02 ESXi: SSH service enabled on host T1021.004 0
110403 B1-03 ESXi: SSH authentication event detected T1021.004 0

Note: B1 rules require VMware syslog (if_group=vmware). No matching events — VMware logs are not yet forwarded.


B2 — Log Monitoring (file: soc-b2-logmon-rules.xml)

Rule ID Use Case Description MITRE Events
110411 B2-01 Log Monitor: log ingestion loss detected on monitored stream T1562.006 0

B3 — Windows Sysmon (file: soc-b3-sysmon-rules.xml)

Rule ID Use Case Description MITRE Events
110421 B3-01 Sysmon: LSASS process access detected (event 10) T1003.001 0
110422 B3-02 Sysmon: SQL keyword in process command line (event 1) T1190 0
110423 B3-03 Sysmon: web script file created (possible webshell, event 11) T1505.003 0
110424 B3-04 Sysmon: msiexec uninstall detected (event 1) T1562.001 0
110425 B3-05 Sysmon: LSASS dump via Task Manager (event 10) T1003.001 0
110426 B3-06 Sysmon: certutil.exe execution detected (event 1) T1105 0

Note: B3 rules require Windows Sysmon agent deployed on endpoints. No matching events today.


Appendix C — Advanced Detection (Correlation)

C1 — Impossible Travel (file: soc-c1-c3-rules.xml)

Rule ID Use Case Description MITRE Events
110501 C1-01 VPN login success with geo context — impossible travel candidate T1078 0
110502 C1-01 Impossible travel confirmed by soc-integrator correlation T1078 0

C2 — Advanced Credential Abuse & Privilege Misuse (file: soc-c1-c3-rules.xml)

Rule ID Use Case Description MITRE Events
110511 C2-01 Privileged account auth success (4624) T1078.002 0
110512 C2-02 Dormant/legacy account auth success (4624) T1078 0
110513 C2-03 Service account remote interactive logon type 10 (4624) T1078.003 0
110514 C2-04 Privilege escalation: group membership change (4732) T1098.007 0

C3 — Lateral Movement & Internal Reconnaissance (file: soc-c1-c3-rules.xml)

Rule ID Use Case Description MITRE Events
110521 C3-01/02 RDP auth success logon type 10 (lateral movement indicator) T1021.001, T1078 0
110522 C3-02 SMB network logon type 3 (lateral movement indicator) T1021.002, T1078 0
110523 C3-03 Admin account auth success — lateral movement candidate (4624) T1021.001, T1078.002 0

Summary

Appendix Section Rules Implemented Rules with Events Total Events
A A1 — DNS/IOC 2 0 0
A A2 — FortiGate FW/IPS 10 0 0
A A3 — FortiGate VPN 5 0 0
A A4 — Windows/AD 13 3 285,816
B B1 — VMware 3 0 0
B B2 — Log Monitor 1 0 0
B B3 — Sysmon 6 0 0
C C1 — Impossible Travel 2 0 0
C C2 — Credential Abuse 4 0 0
C C3 — Lateral Movement 3 0 0
Total 49 3 286,931

Active log sources (today)

Source Appendix Status
Windows Security Event Log (via Wazuh agent) A4 ✅ Active — auth failures (4625) and DSRM events (4794) ingesting
FortiGate firewall syslog A2 ❌ No events today (A1/A2 events were on earlier dates)
FortiGate VPN syslog A3, C1 ❌ Not forwarding
DNS / soc-mvp decoder A1 ❌ No events today
soc-integrator log-loss events B2 ❌ No events today
VMware vCenter/ESXi syslog B1 ❌ Not forwarding
Windows Sysmon (via Wazuh agent) B3 ❌ Not deployed