Bez popisu

soc-b3-sysmon-rules.xml 3.6KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. <!--
  2. SOC Proposal Rules — Appendix B3: Windows Sysmon
  3. Simulation profile rule IDs : 100421-100426
  4. Production profile rule IDs : 110421-110426
  5. Production rules use specific built-in Wazuh Sysmon SIDs as parents
  6. to avoid the N×M rule-tree explosion from if_group=sysmon:
  7. 61603 → Sysmon event 1 (process create)
  8. 61612 → Sysmon event 10 (process access)
  9. 61613 → Sysmon event 11 (file create)
  10. -->
  11. <group name="soc_mvp,appendix_b,b3,sysmon,">
  12. <!-- ── Simulation profile ── -->
  13. <!-- ── Production profile ──
  14. Parents are specific built-in Wazuh Sysmon SIDs (not if_group=sysmon)
  15. to avoid N×M rule-tree explosion.
  16. -->
  17. <!-- B3-01: LSASS process access via procdump (Sysmon event 10)
  18. Parent: 61612 (Sysmon event 10 - process access) -->
  19. <rule id="110421" level="12">
  20. <if_sid>61612</if_sid>
  21. <field name="win.eventdata.targetImage" type="pcre2">(?i)lsass\.exe</field>
  22. <description>B3-01 [PROD] Sysmon: LSASS process access detected (event 10)</description>
  23. <group>soc_prod,b3,credential_access,lsass,</group>
  24. <mitre><id>T1003.001</id></mitre>
  25. </rule>
  26. <!-- B3-02: SQL injection keywords in process command line (Sysmon event 1)
  27. Parent: 61603 (Sysmon event 1 - process create) -->
  28. <rule id="110422" level="12">
  29. <if_sid>61603</if_sid>
  30. <field name="win.eventdata.commandLine" type="pcre2">(?i)select|union|insert|drop|exec</field>
  31. <description>B3-02 [PROD] Sysmon: SQL keyword in process command line (event 1)</description>
  32. <group>soc_prod,b3,webapp,sqli,</group>
  33. <mitre><id>T1190</id></mitre>
  34. </rule>
  35. <!-- B3-03: Web script file creation (Sysmon event 11)
  36. Parent: 61613 (Sysmon event 11 - file create) -->
  37. <rule id="110423" level="12">
  38. <if_sid>61613</if_sid>
  39. <field name="win.eventdata.targetFilename" type="pcre2">\.(?:php|aspx|asp|jsp)$</field>
  40. <description>B3-03 [PROD] Sysmon: web script file created (possible webshell, event 11)</description>
  41. <group>soc_prod,b3,webapp,webshell,</group>
  42. <mitre><id>T1505.003</id></mitre>
  43. </rule>
  44. <!-- B3-04: msiexec uninstall (Sysmon event 1)
  45. Parent: 61603 (Sysmon event 1 - process create) -->
  46. <rule id="110424" level="12">
  47. <if_sid>61603</if_sid>
  48. <field name="win.eventdata.commandLine" type="pcre2">(?i)msiexec</field>
  49. <field name="win.eventdata.commandLine" type="pcre2">(?i)/x|/uninstall</field>
  50. <description>B3-04 [PROD] Sysmon: msiexec uninstall detected (event 1)</description>
  51. <group>soc_prod,b3,defense_evasion,</group>
  52. <mitre><id>T1562.001</id></mitre>
  53. </rule>
  54. <!-- B3-05: LSASS dump via Task Manager (Sysmon event 10)
  55. Parent: 61612 (Sysmon event 10 - process access) -->
  56. <rule id="110425" level="12">
  57. <if_sid>61612</if_sid>
  58. <field name="win.eventdata.sourceImage" type="pcre2">(?i)Taskmgr\.exe</field>
  59. <field name="win.eventdata.targetImage" type="pcre2">(?i)lsass\.exe</field>
  60. <description>B3-05 [PROD] Sysmon: LSASS dump via Task Manager (event 10)</description>
  61. <group>soc_prod,b3,credential_access,lsass,</group>
  62. <mitre><id>T1003.001</id></mitre>
  63. </rule>
  64. <!-- B3-06: certutil download (Sysmon event 1)
  65. Parent: 61603 (Sysmon event 1 - process create) -->
  66. <rule id="110426" level="8">
  67. <if_sid>61603</if_sid>
  68. <field name="win.eventdata.image" type="pcre2">(?i)certutil\.exe</field>
  69. <description>B3-06 [PROD] Sysmon: certutil.exe execution detected (event 1)</description>
  70. <group>soc_prod,b3,download,</group>
  71. <mitre><id>T1105</id></mitre>
  72. </rule>
  73. <!-- ── Production normalized key=value path (soc-mvp production profile) ── -->
  74. </group>