Keine Beschreibung

soc-a1-ioc-rules.xml 1.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. <!--
  2. SOC Proposal Rules — Appendix A1: DNS / Firewall IOC
  3. Simulation profile rule IDs : 100301-100302
  4. Production profile rule IDs : 110301-110302
  5. Severity mapping:
  6. Medium → level 8
  7. Decoded fields used (soc-mvp-dns):
  8. status = event_type (ioc_dns_traffic | ioc_domain_match)
  9. srcip = source IP
  10. url = queried domain
  11. action = blocked | alert
  12. -->
  13. <group name="soc_mvp,appendix_a,a1,ioc,dns,">
  14. <!-- ── Simulation profile (usecase_id markers present) ── -->
  15. <!-- ── Production profile (field-based matching) ── -->
  16. <rule id="110301" level="8">
  17. <if_sid>100250</if_sid>
  18. <match>event_type=ioc_dns_traffic</match>
  19. <description>A1-01 [PROD] DNS query to malicious domain (IOC traffic indicator)</description>
  20. <group>soc_prod,a1,ioc,</group>
  21. <mitre>
  22. <id>T1071.004</id>
  23. </mitre>
  24. </rule>
  25. <rule id="110302" level="8">
  26. <if_sid>100250</if_sid>
  27. <match>event_type=ioc_domain_match</match>
  28. <description>A1-02 [PROD] DNS IOC domain match from threat intelligence feed</description>
  29. <group>soc_prod,a1,ioc,</group>
  30. <mitre>
  31. <id>T1568</id>
  32. </mitre>
  33. </rule>
  34. <!-- ── Production normalized key=value path (soc-mvp production profile) ── -->
  35. </group>