Hello,
To detect EternalBlue and BlueKeep attacks it is necessary to create rules that can detect these attacks, maybe this community can help you. About Sigma rules, which rules and how did you import them?
Also, if you share with me what version of Wazuh you are using and how you are replicating the use cases, it may help me in replicating the behavior to find a solution.
Currently, there are no rules for EternalBlue or BlueKeep detection in Wazuh’s default ruleset. You should create them manually. Doing some research I could see that there are some Snort rules to detect possible EternalBlue attacks. You could use Snort to monitor network traffic and then integrate Snort with Wazuh, with the help of localfile. Perhaps Symson could also help. The first thing is to see how attacks can be detected, what events can tell us that something might be going on, and from those events create rules.
About the Sigma rules, there seems to be an error in the MITRE IDs, as they have the following format:
<mitre> <id>attack.execution</id> <id>attack.t1047</id> <id>attack.t1053.002</id> <id>attack.t1569.002</id> </mitre>But they should be:
<mitre> <id>T1047</id> <id>T1053.002</id> <id>T1569.002</id> </mitre>