@@ -3,18 +3,20 @@ id: 07eed200-03f5-11ec-98fb-acde48001122
3
3
version : 7
4
4
date : ' 2025-05-02'
5
5
author : Teoderick Contreras, Splunk
6
- status : production
6
+ status : Experimental
7
7
type : Anomaly
8
- description : The following analytic detects shared files in Google Drive with suspicious
8
+ description :
9
+ The following analytic detects shared files in Google Drive with suspicious
9
10
filenames commonly used in spear phishing campaigns. It leverages GSuite Drive logs
10
11
to identify documents with titles that include keywords like "dhl," "ups," "invoice,"
11
12
and "shipment." This activity is significant because such filenames are often used
12
13
to lure users into opening malicious documents or clicking harmful links. If confirmed
13
14
malicious, this activity could lead to unauthorized access, data theft, or further
14
15
compromise of the user's system.
15
16
data_source :
16
- - G Suite Drive
17
- search : ' `gsuite_drive` parameters.owner_is_team_drive=false "parameters.doc_title"
17
+ - G Suite Drive
18
+ search :
19
+ ' `gsuite_drive` parameters.owner_is_team_drive=false "parameters.doc_title"
18
20
IN ("*dhl*", "* ups *", "*delivery*", "*parcel*", "*label*", "*invoice*", "*postal*",
19
21
"*fedex*", "* usps *", "* express *", "*shipment*", "*Banking/Tax*","*shipment*",
20
22
"*new order*") parameters.doc_type IN ("document","pdf", "msexcel", "msword", "spreadsheet",
@@ -25,55 +27,57 @@ search: '`gsuite_drive` parameters.owner_is_team_drive=false "parameters.doc_tit
25
27
parameters.target_user parameters.doc_title parameters.doc_type phase severity |
26
28
rename parameters.target_user AS user | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
27
29
| `gsuite_suspicious_shared_file_name_filter`'
28
- how_to_implement : To successfully implement this search, you need to be ingesting
30
+ how_to_implement :
31
+ To successfully implement this search, you need to be ingesting
29
32
logs related to gsuite having the file attachment metadata like file type, file
30
33
extension, source email, destination email, num of attachment and etc. In order
31
34
for the search to work for your environment, please edit the query to use your company
32
35
specific email domain instead of `internal_test_email.com`.
33
- known_false_positives : normal user or normal transaction may contain the subject and
36
+ known_false_positives :
37
+ normal user or normal transaction may contain the subject and
34
38
file type attachment that this detection try to search
35
39
references :
36
- - https://www.redhat.com/en/topics/devops/what-is-devsecops
37
- - https://www.mandiant.com/resources/top-words-used-in-spear-phishing-attacks
40
+ - https://www.redhat.com/en/topics/devops/what-is-devsecops
41
+ - https://www.mandiant.com/resources/top-words-used-in-spear-phishing-attacks
38
42
drilldown_searches :
39
- - name : View the detection results for - "$email$"
40
- search : ' %original_detection_search% | search email = "$email$"'
41
- earliest_offset : $info_min_time$
42
- latest_offset : $info_max_time$
43
- - name : View risk events for the last 7 days for - "$email$"
44
- search : ' | from datamodel Risk.All_Risk | search normalized_risk_object IN ("$email$")
45
- starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
46
- values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
47
- as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
48
- as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
49
- | `security_content_ctime(lastTime)`'
50
- earliest_offset : $info_min_time$
51
- latest_offset : $info_max_time$
43
+ - name : View the detection results for - "$email$"
44
+ search : ' %original_detection_search% | search email = "$email$"'
45
+ earliest_offset : $info_min_time$
46
+ latest_offset : $info_max_time$
47
+ - name : View risk events for the last 7 days for - "$email$"
48
+ search :
49
+ ' | from datamodel Risk.All_Risk | search normalized_risk_object IN ("$email$")
50
+ starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
51
+ values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
52
+ as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
53
+ as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
54
+ | `security_content_ctime(lastTime)`'
55
+ earliest_offset : $info_min_time$
56
+ latest_offset : $info_max_time$
52
57
rba :
53
58
message : suspicious share gdrive from $parameters.owner$ to $email$ namely as $parameters.doc_title$
54
59
risk_objects :
55
- - field : email
56
- type : user
57
- score : 21
58
- - field : parameters.owner
59
- type : user
60
- score : 21
60
+ - field : email
61
+ type : user
62
+ score : 21
63
+ - field : parameters.owner
64
+ type : user
65
+ score : 21
61
66
threat_objects : []
62
67
tags :
63
68
analytic_story :
64
- - Dev Sec Ops
69
+ - Dev Sec Ops
65
70
asset_type : GSuite
66
71
mitre_attack_id :
67
- - T1566.001
72
+ - T1566.001
68
73
product :
69
- - Splunk Enterprise
70
- - Splunk Enterprise Security
71
- - Splunk Cloud
74
+ - Splunk Enterprise
75
+ - Splunk Enterprise Security
76
+ - Splunk Cloud
72
77
security_domain : endpoint
73
78
tests :
74
- - name : True Positive Test
75
- attack_data :
76
- - data :
77
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1566.001/gdrive_susp_file_share/gdrive_susp_attach.log
78
- source : http:gsuite
79
- sourcetype : gsuite:drive:json
79
+ - name : True Positive Test
80
+ attack_data :
81
+ - data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1566.001/gdrive_susp_file_share/gdrive_susp_attach.log
82
+ source : http:gsuite
83
+ sourcetype : gws:reports:drive
0 commit comments