Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding and Updating O365 detections #2835

Closed
wants to merge 72 commits into from
Closed

Adding and Updating O365 detections #2835

wants to merge 72 commits into from

Conversation

mvelazc0
Copy link
Contributor

@mvelazc0 mvelazc0 commented Aug 31, 2023

Details

What does this PR have in it? Screenshots are worth 1000 words 😄

New Analytic Stories

  • Office 365 Account Compromise
  • Office 365 Persistence Mechanisms

Removed Analytic Story

  • O365 detections

New Detections

  • O365 Service Principal New Client Credentials
  • O365 Mailbox Read Access Granted to Application
  • O365 Tenant Wide Admin Consent Granted
  • O365 Application Registration Owner Added
  • O365 Mailbox Inbox Folder Shared with All Users
  • O365 Advanced Audit Disabled
  • O365 High Number Of Failed Authentications for User
  • O365 Multiple Users Failing To Authenticate From Ip
  • O365 User Consent Blocked for Risky Application
  • O365 User Consent Denied for OAuth Application
  • O365 Mail Permissioned Application Consent Granted by User
  • O365 ApplicationImpersonation Role Assigned
  • O365 File Permissioned Application Consent Granted by User
  • O365 Multiple Failed MFA Requests For User
  • O365 High Privilege Role Granted
  • O365 New MFA Method Registered
  • O365 Multiple AppIDs and UserAgents Authentication Spike
  • O365 Block User Consent For Risky Apps Disabled
  • O365 Multi-Source Failed Authentications Spike

Updated Detections

  • High Number of Login Failures from a single source
  • O365 Add App Role Assignment Grant User
  • O365 Added Service Principal
  • O365 Bypass MFA via Trusted IP
  • O365 Disable MFA
  • O365 Excessive Authentication Failures Alert
  • O365 Excessive SSO logon errors
  • O365 New Federated Domain Added
  • O365 PST export alert
  • O365 Suspicious Admin Email Forwarding*
  • O365 Suspicious Rights Delegation
  • O365 Suspicious User Email Forwarding

Checklist

  • Validate name matches <platform>_<mitre att&ck technique>_<short description> nomenclature
  • CI/CD jobs passed ✔️
  • Validated SPL logic.
  • Validated tags, description, and how to implement.
  • Verified references match analytic.

`o365_management_activity` Workload=AzureActiveDirectory Operation="Add owner to application."
| eval app_id=mvindex('ModifiedProperties{}.NewValue', 0)
| eval app_displayName=mvindex('ModifiedProperties{}.NewValue', 1)
| stats max(_time) as lastTime values(ModifiedProperties{}.NewValue) by Operation, UserId, app_displayName, object
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

use CIM name for UserId in all the detections in the PR. CIM names are usually aliased by the TAs and are in lowercase format in splunk. If its not available, lets use the rename command.

@mvelazc0 mvelazc0 added the WIP DO NOT MERGE Work in Progress label Sep 25, 2023
@mvelazc0 mvelazc0 closed this Dec 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
WIP DO NOT MERGE Work in Progress
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants