Skip to content

Commit 38c3f57

Browse files
authored
Update o365_exfiltration_via_file_download.yml
1 parent 7a00c05 commit 38c3f57

File tree

1 file changed

+9
-19
lines changed

1 file changed

+9
-19
lines changed

detections/cloud/o365_exfiltration_via_file_download.yml

Lines changed: 9 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -35,37 +35,27 @@ drilldown_searches:
3535
search: '`o365_management_activity` Operation IN ("filedownloaded") UserId="$UserId$"'
3636
earliest_offset: $info_min_time$
3737
latest_offset: $info_max_time$
38+
rba:
39+
message: The user $user$ downloaded an excessive number of files [$count$] from $file_path$ using $src$
40+
risk_objects:
41+
- field: user
42+
type: user
43+
score: 25
44+
threat_objects:
45+
- field: src
46+
type: src
3847
tags:
3948
analytic_story:
4049
- Data Exfiltration
4150
- Office 365 Account Takeover
4251
asset_type: O365 Tenant
43-
confidence: 50
44-
impact: 50
45-
message: The user $user$ downloaded an excessive number of files [$count$] from $file_path$ using $src$
4652
mitre_attack_id:
4753
- T1567
4854
- T1530
49-
observable:
50-
- name: user
51-
type: User
52-
role:
53-
- Victim
54-
- name: src
55-
type: IP Address
56-
role:
57-
- Attacker
5855
product:
5956
- Splunk Enterprise
6057
- Splunk Enterprise Security
6158
- Splunk Cloud
62-
required_fields:
63-
- _time
64-
- Operation
65-
- UserId
66-
- Workload
67-
- SiteUrl
68-
risk_score: 25
6959
security_domain: threat
7060
tests:
7161
- name: True Positive Test

0 commit comments

Comments
 (0)