Sin descripción

soc-c1-c3-rules.xml 5.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. <!--
  2. SOC Proposal Rules — Appendix C1-C3
  3. C1: Impossible Travel
  4. C2: Advanced Credential Abuse & Privilege Misuse
  5. C3: Lateral Movement & Internal Reconnaissance
  6. Simulation profile rule IDs : 100501, 100511-100514, 100521-100524
  7. Production profile rule IDs : 110501, 110502, 110511-110514, 110521-110524
  8. C1 prod: if_sid=81622 (VPN tunnel-up / user connected) or if_sid=100260 (soc-integrator)
  9. Environment uses IPsec site-to-site VPN (no SSL-VPN observed in archives 2026-03-20)
  10. if_group=fortigate was broken in Wazuh 4.x → fixed to if_sid
  11. C2/C3 prod: specific built-in Wazuh SIDs to avoid N×M explosion:
  12. 60106 → event 4624 (auth success / logon)
  13. 60113 → events 4728/4732 (group membership change)
  14. -->
  15. <group name="soc_mvp,appendix_c,">
  16. <!-- ================================================================
  17. C1: Impossible Travel Detection
  18. ================================================================ -->
  19. <!-- C1-01 VPN candidate: fires on every VPN tunnel-up (IPsec) or SSL-VPN success
  20. Parent: 81622 (Fortigate: VPN user connected / action=tunnel-up)
  21. The srccountry field is present in real VPN events; soc-integrator handles
  22. geo correlation and emits c1_impossible_travel to trigger rule 110502.
  23. Fix 2026-03-19: if_group=fortigate broken → if_sid=81622;
  24. action="ssl-login-success" → IPsec tunnel-up via 81622 -->
  25. <rule id="110501" level="12">
  26. <if_sid>81622</if_sid>
  27. <description>C1-01 [PROD] VPN tunnel connected — impossible travel geo candidate</description>
  28. <group>soc_prod,c1,impossible_travel,identity,</group>
  29. <mitre><id>T1078</id></mitre>
  30. </rule>
  31. <rule id="110502" level="15">
  32. <if_sid>100260</if_sid>
  33. <match>event_type=c1_impossible_travel</match>
  34. <description>C1-01 [PROD] Impossible travel confirmed by soc-integrator correlation</description>
  35. <group>soc_prod,c1,impossible_travel,identity,</group>
  36. <mitre><id>T1078</id></mitre>
  37. </rule>
  38. <!-- ================================================================
  39. C2: Advanced Credential Abuse & Privilege Misuse
  40. ================================================================ -->
  41. <!-- C2 production rules
  42. Parent: 60106 (event 4624 - logon success) for auth rules
  43. 60113 (events 4728/4732 - group membership) for privilege rules -->
  44. <rule id="110511" level="12">
  45. <if_sid>60106</if_sid>
  46. <field name="win.eventdata.targetUserName" type="pcre2">(?i)admin</field>
  47. <description>C2-01 [PROD] Privileged account auth success (4624)</description>
  48. <group>soc_prod,c2,credential_abuse,identity,</group>
  49. <mitre><id>T1078.002</id></mitre>
  50. </rule>
  51. <rule id="110512" level="8">
  52. <if_sid>60106</if_sid>
  53. <field name="win.eventdata.targetUserName" type="pcre2">(?i)legacy</field>
  54. <description>C2-02 [PROD] Dormant/legacy account auth success (4624)</description>
  55. <group>soc_prod,c2,credential_abuse,identity,</group>
  56. <mitre><id>T1078</id></mitre>
  57. </rule>
  58. <rule id="110513" level="12">
  59. <if_sid>60106</if_sid>
  60. <field name="win.eventdata.logonType">^10$</field>
  61. <field name="win.eventdata.targetUserName" type="pcre2">(?i)svc|service|\$$</field>
  62. <description>C2-03 [PROD] Service account remote interactive logon type 10 (4624)</description>
  63. <group>soc_prod,c2,service_account,identity,</group>
  64. <mitre><id>T1078.003</id></mitre>
  65. </rule>
  66. <rule id="110514" level="12">
  67. <if_sid>60113</if_sid>
  68. <field name="win.system.eventID">^4732$</field>
  69. <description>C2-04 [PROD] Privilege escalation: group membership change (4732)</description>
  70. <group>soc_prod,c2,privilege_escalation,identity,</group>
  71. <mitre><id>T1098.007</id></mitre>
  72. </rule>
  73. <!-- ================================================================
  74. C3: Lateral Movement & Internal Reconnaissance
  75. ================================================================ -->
  76. <!-- C3 production rules
  77. Parent: 60106 (event 4624 - logon success) -->
  78. <rule id="110521" level="12">
  79. <if_sid>60106</if_sid>
  80. <field name="win.eventdata.logonType">^10$</field>
  81. <description>C3-01/02 [PROD] RDP auth success logon type 10 (lateral movement indicator)</description>
  82. <group>soc_prod,c3,lateral_movement,rdp,</group>
  83. <mitre><id>T1021.001</id></mitre>
  84. <mitre><id>T1078</id></mitre>
  85. </rule>
  86. <rule id="110522" level="12">
  87. <if_sid>60106</if_sid>
  88. <field name="win.eventdata.logonType">^3$</field>
  89. <description>C3-02 [PROD] SMB network logon type 3 (lateral movement indicator)</description>
  90. <group>soc_prod,c3,lateral_movement,smb,</group>
  91. <mitre><id>T1021.002</id></mitre>
  92. <mitre><id>T1078</id></mitre>
  93. </rule>
  94. <rule id="110523" level="15">
  95. <if_sid>60106</if_sid>
  96. <field name="win.eventdata.targetUserName" type="pcre2">(?i)admin</field>
  97. <description>C3-03 [PROD] Admin account auth success — lateral movement candidate (4624)</description>
  98. <group>soc_prod,c3,lateral_movement,admin,</group>
  99. <mitre><id>T1021.001</id></mitre>
  100. <mitre><id>T1078.002</id></mitre>
  101. </rule>
  102. <!-- C3-04 PROD: WFP event 5156 has no specific built-in Wazuh parent SID.
  103. Skip prod rule to avoid N×M explosion from using a generic windows parent. -->
  104. </group>