Keine Beschreibung

soc-c1-c3-rules.xml 4.7KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. <!--
  2. SOC Proposal Rules — Appendix C1-C3
  3. C1: Impossible Travel
  4. C2: Advanced Credential Abuse & Privilege Misuse
  5. C3: Lateral Movement & Internal Reconnaissance
  6. Simulation profile rule IDs : 100501, 100511-100514, 100521-100524
  7. Production profile rule IDs : 110501, 110502, 110511-110514, 110521-110524
  8. C1 prod: if_group=fortigate (VPN) or if_sid=100260 (soc-integrator)
  9. C2/C3 prod: specific built-in Wazuh SIDs to avoid N×M explosion:
  10. 60106 → event 4624 (auth success / logon)
  11. 60113 → events 4728/4732 (group membership change)
  12. -->
  13. <group name="soc_mvp,appendix_c,">
  14. <!-- ================================================================
  15. C1: Impossible Travel Detection
  16. ================================================================ -->
  17. <rule id="110501" level="12">
  18. <if_group>fortigate</if_group>
  19. <match>action="ssl-login-success"</match>
  20. <description>C1-01 [PROD] VPN login success with geo context — impossible travel candidate</description>
  21. <group>soc_prod,c1,impossible_travel,identity,</group>
  22. <mitre><id>T1078</id></mitre>
  23. </rule>
  24. <rule id="110502" level="15">
  25. <if_sid>100260</if_sid>
  26. <match>event_type=c1_impossible_travel</match>
  27. <description>C1-01 [PROD] Impossible travel confirmed by soc-integrator correlation</description>
  28. <group>soc_prod,c1,impossible_travel,identity,</group>
  29. <mitre><id>T1078</id></mitre>
  30. </rule>
  31. <!-- ================================================================
  32. C2: Advanced Credential Abuse & Privilege Misuse
  33. ================================================================ -->
  34. <!-- C2 production rules
  35. Parent: 60106 (event 4624 - logon success) for auth rules
  36. 60113 (events 4728/4732 - group membership) for privilege rules -->
  37. <rule id="110511" level="12">
  38. <if_sid>60106</if_sid>
  39. <field name="win.eventdata.targetUserName" type="pcre2">(?i)admin</field>
  40. <description>C2-01 [PROD] Privileged account auth success (4624)</description>
  41. <group>soc_prod,c2,credential_abuse,identity,</group>
  42. <mitre><id>T1078.002</id></mitre>
  43. </rule>
  44. <rule id="110512" level="8">
  45. <if_sid>60106</if_sid>
  46. <field name="win.eventdata.targetUserName" type="pcre2">(?i)legacy</field>
  47. <description>C2-02 [PROD] Dormant/legacy account auth success (4624)</description>
  48. <group>soc_prod,c2,credential_abuse,identity,</group>
  49. <mitre><id>T1078</id></mitre>
  50. </rule>
  51. <rule id="110513" level="12">
  52. <if_sid>60106</if_sid>
  53. <field name="win.eventdata.logonType">^10$</field>
  54. <field name="win.eventdata.targetUserName" type="pcre2">(?i)svc|service|\$$</field>
  55. <description>C2-03 [PROD] Service account remote interactive logon type 10 (4624)</description>
  56. <group>soc_prod,c2,service_account,identity,</group>
  57. <mitre><id>T1078.003</id></mitre>
  58. </rule>
  59. <rule id="110514" level="12">
  60. <if_sid>60113</if_sid>
  61. <field name="win.system.eventID">^4732$</field>
  62. <description>C2-04 [PROD] Privilege escalation: group membership change (4732)</description>
  63. <group>soc_prod,c2,privilege_escalation,identity,</group>
  64. <mitre><id>T1098.007</id></mitre>
  65. </rule>
  66. <!-- ================================================================
  67. C3: Lateral Movement & Internal Reconnaissance
  68. ================================================================ -->
  69. <!-- C3 production rules
  70. Parent: 60106 (event 4624 - logon success) -->
  71. <rule id="110521" level="12">
  72. <if_sid>60106</if_sid>
  73. <field name="win.eventdata.logonType">^10$</field>
  74. <description>C3-01/02 [PROD] RDP auth success logon type 10 (lateral movement indicator)</description>
  75. <group>soc_prod,c3,lateral_movement,rdp,</group>
  76. <mitre><id>T1021.001</id></mitre>
  77. <mitre><id>T1078</id></mitre>
  78. </rule>
  79. <rule id="110522" level="12">
  80. <if_sid>60106</if_sid>
  81. <field name="win.eventdata.logonType">^3$</field>
  82. <description>C3-02 [PROD] SMB network logon type 3 (lateral movement indicator)</description>
  83. <group>soc_prod,c3,lateral_movement,smb,</group>
  84. <mitre><id>T1021.002</id></mitre>
  85. <mitre><id>T1078</id></mitre>
  86. </rule>
  87. <rule id="110523" level="15">
  88. <if_sid>60106</if_sid>
  89. <field name="win.eventdata.targetUserName" type="pcre2">(?i)admin</field>
  90. <description>C3-03 [PROD] Admin account auth success — lateral movement candidate (4624)</description>
  91. <group>soc_prod,c3,lateral_movement,admin,</group>
  92. <mitre><id>T1021.001</id></mitre>
  93. <mitre><id>T1078.002</id></mitre>
  94. </rule>
  95. <!-- C3-04 PROD: WFP event 5156 has no specific built-in Wazuh parent SID.
  96. Skip prod rule to avoid N×M explosion from using a generic windows parent. -->
  97. </group>