Загрузка данных
user@govno:~$ sudo cat /var/ossec/etc/rules/local_rules.xml
<!-- Local rules -->
<!-- Modify it at your will. -->
<!-- Copyright (C) 2015, Wazuh Inc. -->
<!-- Example -->
<group name="local,syslog,sshd,">
<!--
Dec 10 01:02:02 host sshd[1234]: Failed none for root from 1.1.1.1 port 1066 ssh2
-->
<rule id="100001" level="5">
<if_sid>5716</if_sid>
<srcip>1.1.1.1</srcip>
<description>sshd: authentication failed from IP 1.1.1.1.</description>
<group>authentication_failed,pci_dss_10.2.4,pci_dss_10.2.5,</group>
</rule>
</group>
<group name="suricata,ids,ot,">
<!-- Перехватываем FreePBX-родительское правило для Suricata-логов -->
<rule id="100500" level="5">
<if_sid>70000</if_sid>
<match>suricata</match>
<description>Suricata event captured from pfSense</description>
<group>suricata,ids,</group>
</rule>
<!-- Высокий приоритет: события с нашими SID -->
<rule id="100501" level="10">
<if_sid>100500</if_sid>
<match>1000010</match>
<description>OT Attack: Unauthorized access to SCADA from non-admin network</description>
<mitre>
<id>T1046</id>
<id>T0846</id>
</mitre>
<group>ot_attack,unauthorized_access,</group>
</rule>
<!-- Критично: Kali в OT -->
<rule id="100502" level="12">
<if_sid>100500</if_sid>
<match>10.0.20.10</match>
<description>CRITICAL: Pentester (Kali) attacking OT segment</description>
<mitre>
<id>T1046</id>
</mitre>
<group>ot_attack,pentest_detected,</group>
</rule>
<!-- SID 1000011 - наше правило про Kali в OT -->
<rule id="100503" level="11">
<if_sid>100500</if_sid>
<match>1000011</match>
<description>OT: Pentester Kali Linux accessing OT network</description>
<group>ot_attack,pentest_detected,</group>
</rule>
<!-- ICMP в OT -->
<rule id="100504" level="7">
<if_sid>100500</if_sid>
<match>1000099</match>
<description>OT: ICMP probe in monitored network</description>
<group>recon,</group>
</rule>
</group>
<group name="sysmon_custom,windows,">
<!-- Базовое правило: ловим любое Sysmon-событие -->
<rule id="100100" level="2">
<decoded_as>json</decoded_as>
<field name="win.system.providerName">Microsoft-Windows-Sysmon</field>
<description>Sysmon: событие получено (EventID $(win.system.eventID))</description>
<group>sysmon,</group>
</rule>
<!-- EventID 1: Process Create -->
<rule id="100101" level="2">
<if_sid>100100</if_sid>
<field name="win.system.eventID">^1$</field>
<description>Sysmon EID 1 - Process Create: $(win.eventdata.image) от пользователя $(win.eventdata.user)</description>
<group>sysmon_event1,process_creation,</group>
</rule>
<!-- EventID 3: Network Connection -->
<rule id="100103" level="4">
<if_sid>100100</if_sid>
<field name="win.system.eventID">^3$</field>
<description>Sysmon EID 3 - Network Connection: $(win.eventdata.image)</description>
<group>sysmon_event3,network,</group>
</rule>
<!-- EventID 7: Image Loaded (загрузка DLL) -->
<rule id="100107" level="3">
<if_sid>100100</if_sid>
<field name="win.system.eventID">^7$</field>
<description>Sysmon EID 7 - Image Loaded: $(win.eventdata.imageLoaded)</description>
<group>sysmon_event7,</group>
</rule>
<!-- EventID 11: File Create -->
<rule id="100111" level="4">
<if_sid>100100</if_sid>
<field name="win.system.eventID">^11$</field>
<description>Sysmon EID 11 - File Created: $(win.eventdata.targetFilename)</description>
<group>sysmon_event11,file_creation,</group>
</rule>
<!-- EventID 13: Registry Value Set -->
<rule id="100113" level="4">
<if_sid>100100</if_sid>
<field name="win.system.eventID">^13$</field>
<description>Sysmon EID 13 - Registry Value Set: $(win.eventdata.targetObject)</description>
<group>sysmon_event13,registry,</group>
</rule>
<!-- EventID 22: DNS Query -->
<rule id="100122" level="3">
<if_sid>100100</if_sid>
<field name="win.system.eventID">^22$</field>
<description>Sysmon EID 22 - DNS Query: $(win.eventdata.queryName)</description>
<group>sysmon_event22,dns,</group>
</rule>
<!-- ============ ПРИМЕРЫ ПРАВИЛ ДЛЯ ПОДОЗРИТЕЛЬНОЙ АКТИВНОСТИ ============ -->
<!-- PowerShell запускает cmd.exe или другие подозрительные процессы -->
<rule id="100201" level="10">
<if_sid>100101</if_sid>
<field name="win.eventdata.parentImage">powershell\.exe</field>
<field name="win.eventdata.image">cmd\.exe|whoami\.exe|net\.exe|nslookup\.exe</field>
<description>Подозрительно: PowerShell запустил $(win.eventdata.image)</description>
<group>attack,powershell,</group>
</rule>
<!-- Запуск процесса из временной папки -->
<rule id="100202" level="9">
<if_sid>100101</if_sid>
<field name="win.eventdata.image">\\\\Temp\\\\|\\\\AppData\\\\Local\\\\Temp</field>
<description>Подозрительно: запуск из временной папки $(win.eventdata.image)</description>
<group>attack,suspicious_process,</group>
</rule>
<!-- Создание исполняемого файла -->
<rule id="100203" level="8">
<if_sid>100111</if_sid>
<field name="win.eventdata.targetFilename">\.exe$|\.dll$|\.ps1$|\.bat$</field>
<description>Создан исполняемый файл: $(win.eventdata.targetFilename)</description>
<group>attack,file_drop,</group>
</rule>
</group>