Skip to content

Commit 0468dff

Browse files
authored
Merge branch 'develop' into analytics_enhancement
2 parents 15ab58b + 9dc252d commit 0468dff

9 files changed

+150
-9
lines changed
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
name: O365 SharePoint Suspicious Search Behavior
2+
id: 6ca919db-52f3-4c95-a4e9-7b189e8a043d
3+
version: 1
4+
date: '2025-01-08'
5+
author: Steven Dick
6+
status: production
7+
type: Anomaly
8+
description: The following analytic identifies when the O365 SharePoint users search for suspicious keywords or have an excessive number of queries within a limited timeframe. This behavior may indicate malicious actor enumeration of SharePoint based data within O365.
9+
data_source:
10+
- Office 365 Universal Audit Log
11+
search: |-
12+
`o365_management_activity` Workload=SharePoint Operation="SearchQueryPerformed" SearchQueryText=* EventData=*search*
13+
| where NOT (match(SearchQueryText, "\*") OR match(SearchQueryText,"(\*)"))
14+
| eval signature_id = CorrelationId, signature=Operation, src = ClientIP, user = UserId, object_name=EventData, command = SearchQueryText, -time = _time
15+
| bin _time span=1hr
16+
| stats values(object_name) as object_name values(command) as command, values(src) as src, dc(command) as count, min(-time) as firstTime, max(-time) as lastTime by user,signature,_time
17+
| where count > 20 OR match(command, "(?i)password|credential|passwd|shadow|active directory|account|username|network|computer|access|MFA|bank|deposit|payroll|EFT|Electonic Funds|routing")
18+
| `security_content_ctime(firstTime)`
19+
| `security_content_ctime(lastTime)`
20+
| `o365_sharepoint_suspicious_search_behavior_filter`
21+
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events. The thresholds and match terms set within the analytic are initial guidelines and should be customized based on the organization's user behavior and risk profile. Security teams are encouraged to adjust these thresholds to optimize the balance between detecting genuine threats and minimizing false positives, ensuring the detection is tailored to their specific environment.
22+
known_false_positives: Users searching excessively or possible false positives related to matching conditions.
23+
references:
24+
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a
25+
- https://attack.mitre.org/techniques/T1213/002/
26+
drilldown_searches:
27+
- name: View the detection results for - "$user$"
28+
search: '%original_detection_search% | search user = "$user$"'
29+
earliest_offset: $info_min_time$
30+
latest_offset: $info_max_time$
31+
- name: View risk events for the last 7 days for - "$user$"
32+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
33+
earliest_offset: $info_min_time$
34+
latest_offset: $info_max_time$
35+
- name: Investigate search behavior by $user$
36+
search: '`o365_management_activity` Workload=SharePoint Operation="SearchQueryPerformed" SearchQueryText=* EventData=*search* AND UserId = "$user$"'
37+
earliest_offset: $info_min_time$
38+
latest_offset: $info_max_time$
39+
rba:
40+
message: The SharePoint Online was searched suspiciously by $user$
41+
risk_objects:
42+
- field: user
43+
type: user
44+
score: 25
45+
threat_objects:
46+
- field: src
47+
type: ip_address
48+
tags:
49+
analytic_story:
50+
- Azure Active Directory Persistence
51+
- Office 365 Account Takeover
52+
- CISA AA22-320A
53+
asset_type: O365 Tenant
54+
mitre_attack_id:
55+
- T1213.002
56+
- T1552
57+
product:
58+
- Splunk Enterprise
59+
- Splunk Enterprise Security
60+
- Splunk Cloud
61+
security_domain: threat
62+
tests:
63+
- name: True Positive Test
64+
attack_data:
65+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1213.002/o365_sus_sharepoint_search/o365_sus_sharepoint_search.log
66+
source: o365
67+
sourcetype: o365:management:activity

detections/endpoint/detect_remote_access_software_usage_file.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage File
22
id: 3bf5541a-6a45-4fdc-b01d-59b899fff961
3-
version: 5
3+
version: 6
44
date: '2024-11-13'
55
author: Steven Dick
66
status: production
@@ -54,6 +54,10 @@ drilldown_searches:
5454
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
5555
earliest_offset: $info_min_time$
5656
latest_offset: $info_max_time$
57+
- name: Investigate files on $dest$
58+
search: '| from datamodel:Endpoint.Filesystem | search dest=$dest$ file_name=$file_name$'
59+
earliest_offset: $info_min_time$
60+
latest_offset: $info_max_time$
5761
rba:
5862
message: A file for known a remote access software [$file_name$] was created on
5963
$dest$ by $user$.
@@ -67,13 +71,16 @@ rba:
6771
threat_objects:
6872
- field: file_name
6973
type: file_name
74+
- field: signature
75+
type: signature
7076
tags:
7177
analytic_story:
7278
- Insider Threat
7379
- Command And Control
7480
- Ransomware
7581
- Gozi Malware
7682
- CISA AA24-241A
83+
- Remote Monitoring and Management Software
7784
asset_type: Endpoint
7885
mitre_attack_id:
7986
- T1219

detections/endpoint/detect_remote_access_software_usage_fileinfo.yml

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage FileInfo
22
id: ccad96d7-a48c-4f13-8b9c-9f6a31cba454
3-
version: 5
3+
version: 6
44
date: '2024-11-13'
55
author: Steven Dick
66
status: production
@@ -47,22 +47,32 @@ drilldown_searches:
4747
| `security_content_ctime(lastTime)`'
4848
earliest_offset: $info_min_time$
4949
latest_offset: $info_max_time$
50+
- name: Investigate processes on $dest$
51+
search: '| from datamodel:Endpoint.Processes| search dest=$dest$ process_name=$process_name$'
52+
earliest_offset: $info_min_time$
53+
latest_offset: $info_max_time$
5054
rba:
5155
message: A file attributes for known a remote access software [$process_name$] was
5256
detected on $dest$
5357
risk_objects:
5458
- field: dest
5559
type: system
5660
score: 25
61+
- field: user
62+
type: user
63+
score: 25
5764
threat_objects:
5865
- field: process_name
5966
type: process_name
67+
- field: signature
68+
type: signature
6069
tags:
6170
analytic_story:
6271
- Insider Threat
6372
- Command And Control
6473
- Ransomware
6574
- Gozi Malware
75+
- Remote Monitoring and Management Software
6676
asset_type: Endpoint
6777
mitre_attack_id:
6878
- T1219

detections/endpoint/detect_remote_access_software_usage_process.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage Process
22
id: ffd5e001-2e34-48f4-97a2-26dc4bb08178
3-
version: 5
3+
version: 6
44
date: '2024-11-13'
55
author: Steven Dick
66
status: production
@@ -59,6 +59,10 @@ drilldown_searches:
5959
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
6060
earliest_offset: $info_min_time$
6161
latest_offset: $info_max_time$
62+
- name: Investigate processes on $dest$
63+
search: '| from datamodel:Endpoint.Processes| search dest=$dest$ process_name=$process_name$'
64+
earliest_offset: $info_min_time$
65+
latest_offset: $info_max_time$
6266
rba:
6367
message: A process for a known remote access software $process_name$ was identified
6468
on $dest$.
@@ -72,13 +76,16 @@ rba:
7276
threat_objects:
7377
- field: process_name
7478
type: process_name
79+
- field: signature
80+
type: signature
7581
tags:
7682
analytic_story:
7783
- Insider Threat
7884
- Command And Control
7985
- Ransomware
8086
- Gozi Malware
8187
- CISA AA24-241A
88+
- Remote Monitoring and Management Software
8289
asset_type: Endpoint
8390
mitre_attack_id:
8491
- T1219

detections/endpoint/detect_remote_access_software_usage_registry.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage Registry
22
id: 33804986-25dd-43cf-bb6b-dc14956c7cbc
3-
version: 2
3+
version: 3
44
date: '2025-01-10'
55
author: Steven Dick
66
status: production
@@ -60,6 +60,7 @@ tags:
6060
- Ransomware
6161
- Gozi Malware
6262
- CISA AA24-241A
63+
- Remote Monitoring and Management Software
6364
asset_type: Endpoint
6465
mitre_attack_id:
6566
- T1219

detections/network/detect_remote_access_software_usage_dns.yml

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage DNS
22
id: a16b797d-e309-41bd-8ba0-5067dae2e4be
3-
version: 5
3+
version: 6
44
date: '2024-11-15'
55
author: Steven Dick
66
status: production
@@ -52,21 +52,28 @@ drilldown_searches:
5252
| `security_content_ctime(lastTime)`'
5353
earliest_offset: $info_min_time$
5454
latest_offset: $info_max_time$
55+
- name: Investigate traffic to $query$
56+
search: '| from datamodel:Network_Resolution.DNS | search src=$src$ query=$query$'
57+
earliest_offset: $info_min_time$
58+
latest_offset: $info_max_time$
5559
rba:
5660
message: A domain for a known remote access software $query$ was contacted by $src$.
5761
risk_objects:
5862
- field: src
5963
type: system
60-
score: 4
64+
score: 25
6165
threat_objects:
6266
- field: query
6367
type: domain
68+
- field: signature
69+
type: signature
6470
tags:
6571
analytic_story:
6672
- Insider Threat
6773
- Command And Control
6874
- Ransomware
6975
- CISA AA24-241A
76+
- Remote Monitoring and Management Software
7077
asset_type: Endpoint
7178
mitre_attack_id:
7279
- T1219

detections/network/detect_remote_access_software_usage_traffic.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage Traffic
22
id: 885ea672-07ee-475a-879e-60d28aa5dd42
3-
version: 5
3+
version: 6
44
date: '2024-11-15'
55
author: Steven Dick
66
status: production
@@ -52,19 +52,29 @@ drilldown_searches:
5252
| `security_content_ctime(lastTime)`'
5353
earliest_offset: $info_min_time$
5454
latest_offset: $info_max_time$
55+
- name: Investigate application traffic for $app$
56+
search: '| from datamodel:Network_Traffic.All_Traffic | search src=$src$ app=$app$'
57+
earliest_offset: $info_min_time$
58+
latest_offset: $info_max_time$
5559
rba:
5660
message: Application traffic for a known remote access software [$signature$] was
5761
detected from $src$.
5862
risk_objects:
5963
- field: src
6064
type: system
6165
score: 25
62-
threat_objects: []
66+
- field: user
67+
type: user
68+
score: 25
69+
threat_objects:
70+
- field: signature
71+
type: signature
6372
tags:
6473
analytic_story:
6574
- Insider Threat
6675
- Command And Control
6776
- Ransomware
77+
- Remote Monitoring and Management Software
6878
asset_type: Network
6979
mitre_attack_id:
7080
- T1219

detections/web/detect_remote_access_software_usage_url.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage URL
22
id: 9296f515-073c-43a5-88ec-eda5a4626654
3-
version: 6
3+
version: 7
44
date: '2024-11-15'
55
author: Steven Dick
66
status: production
@@ -52,6 +52,10 @@ drilldown_searches:
5252
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
5353
earliest_offset: $info_min_time$
5454
latest_offset: $info_max_time$
55+
- name: Investigate traffic to $url_domain$
56+
search: '| from datamodel:Web | search src=$src$ url_domain=$url_domain$'
57+
earliest_offset: $info_min_time$
58+
latest_offset: $info_max_time$
5559
rba:
5660
message: A domain for a known remote access software $url_domain$ was contacted
5761
by $src$.
@@ -65,12 +69,15 @@ rba:
6569
threat_objects:
6670
- field: url_domain
6771
type: domain
72+
- field: signature
73+
type: signature
6874
tags:
6975
analytic_story:
7076
- Insider Threat
7177
- Command And Control
7278
- Ransomware
7379
- CISA AA24-241A
80+
- Remote Monitoring and Management Software
7481
asset_type: Network
7582
mitre_attack_id:
7683
- T1219
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: Remote Monitoring and Management Software
2+
id: e405907a-273c-41c9-928c-768c9355c1f7
3+
version: 1
4+
date: '2025-01-14'
5+
author: Steven Dick
6+
status: production
7+
description: |-
8+
Fortify your remote access and unapproved software monitoring with searches that monitor for and help you investigate the use of unappoved or malicious remote monitoring and management softwares (RMM).
9+
narrative: |-
10+
Attackers can leverage a variety of 3rd party software to establish unapproved remote access or c2 channels to an enterprise network. Common techniques include the installation of these remote access software via channels via phishing, scam, or driveby malware compromise situations. While this Analytic Story is not a comprehensive listing of all RMM software it provides a useful starting point for well known indicators.
11+
12+
Be sure to leverage the "RMM Software Tracking" dashboard provided with this story for a convienent way to vizualize RMM usage in your enviroment.
13+
references:
14+
- https://attack.mitre.org/techniques/T1219/
15+
- https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/
16+
- https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/
17+
tags:
18+
category:
19+
- Malware
20+
- Adversary Tactics
21+
product:
22+
- Splunk Enterprise
23+
- Splunk Enterprise Security
24+
- Splunk Cloud
25+
usecase: Security Monitoring

0 commit comments

Comments
 (0)