Skip to content

Commit 4c80dba

Browse files
committed
Fix some typos in the data_source fields. Many detections were referencing data sources that ACTUALLY exist, but by the wrong name.
1 parent ec7fadd commit 4c80dba

28 files changed

+34
-34
lines changed

detections/application/windows_ad_dangerous_deny_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies an Active Directory access-control list (ACL)
1111
modification event, which applies permissions that deny the ability to enumerate
1212
permissions of the object.

detections/application/windows_ad_dangerous_group_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: 'This detection monitors the addition of the following ACLs to an Active
1111
Directory group object: "Full control", "All extended rights", "All validated writes", "Create
1212
all child objects", "Delete all child objects", "Delete subtree", "Delete", "Modify

detections/application/windows_ad_dangerous_user_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: 'This detection monitors the addition of the following ACLs to an Active
1111
Directory user object: "Full control","All extended rights","All validated writes",
1212
"Create all child objects","Delete all child objects","Delete subtree","Delete","Modify

detections/application/windows_ad_dcshadow_privileges_acl_addition.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies an Active Directory access-control list (ACL)
1111
modification event, which applies the minimum required extended rights to perform
1212
the DCShadow attack.

detections/application/windows_ad_domain_root_acl_deletion.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: ACL deletion performed on the domain root object, significant AD change
1111
with high impact. Following MS guidance all changes at this level should be reviewed.
1212
Drill into the logonID within EventCode 4624 for information on the source device

detections/application/windows_ad_domain_root_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: ACL modification performed on the domain root object, significant AD
1111
change with high impact. Following MS guidance all changes at this level should
1212
be reviewed. Drill into the logonID within EventCode 4624 for information on the

detections/application/windows_ad_gpo_deleted.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies when an Active Directory Group Policy is deleted
1111
using the Group Policy Management Console.
1212
search: '`wineventlog_security` EventCode=5136 AttributeLDAPDisplayName=gpLink | eval ObjectDN=upper(ObjectDN)

detections/application/windows_ad_gpo_disabled.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies when an Active Directory Group Policy is disabled
1111
using the Group Policy Management Console.
1212
search: '`wineventlog_security` EventCode=5136 AttributeLDAPDisplayName=flags OperationType="%%14674"

detections/application/windows_ad_gpo_new_cse_addition.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies when a a new client side extension is added
1111
to an Active Directory Group Policy using the Group Policy Management Console.
1212
search: '`wineventlog_security` EventCode=5136 ObjectClass=groupPolicyContainer AttributeLDAPDisplayName=gPCMachineExtensionNames

detections/application/windows_ad_hidden_ou_creation.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This analytic is looking for when an ACL is applied to an OU which denies
1111
listing the objects residing in the OU. This activity combined with modifying the
1212
owner of the OU will hide AD objects even from domain administrators.

0 commit comments

Comments
 (0)