Skip to content

Commit 97b27a6

Browse files
authored
Update o365_sharepoint_suspicious_search_behavior.yml
update to v5 yaml spec / update search yaml for better readability / remove single quote in SPL issues
1 parent fb41db9 commit 97b27a6

File tree

1 file changed

+19
-20
lines changed

1 file changed

+19
-20
lines changed

detections/cloud/o365_sharepoint_suspicious_search_behavior.yml

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,16 @@ type: Anomaly
88
description: The following analytic identifies when the O365 SharePoint users search for suspicious keywords or have an excessive number of queries within a limited timeframe. This behavior may indicate malicious actor enumeration of SharePoint based data within O365.
99
data_source:
1010
- Office 365 Universal Audit Log
11-
search: '`o365_management_activity` Workload=SharePoint Operation="SearchQueryPerformed" SearchQueryText=* EventData=*search*
12-
| where NOT (match(SearchQueryText, "\*") OR match(SearchQueryText,"(\*)"))
13-
| eval signature_id = CorrelationId, signature=Operation, src = ClientIP, user = UserId, object_name=EventData, command = SearchQueryText, -time = _time
14-
| bin _time span=1hr
15-
| stats values(object_name) as object_name values(command) as command, values(src) as src, dc(command) as count, min(-time) as firstTime, max(-time) as lastTime by user,signature,_time
16-
| where count > 20 OR match(command, "(?i)password|credential|passwd|shadow|active directory|account|username|network|computer|access|MFA|bank|deposit|payroll|EFT|Electonic Funds|routing")
17-
| `security_content_ctime(firstTime)`
18-
| `security_content_ctime(lastTime)`
19-
| `o365_sharepoint_suspicious_search_behavior_filter`'
11+
search: |-
12+
`o365_management_activity` Workload=SharePoint Operation="SearchQueryPerformed" SearchQueryText=* EventData=*search*
13+
| where NOT (match(SearchQueryText, "\*") OR match(SearchQueryText,"(\*)"))
14+
| eval signature_id = CorrelationId, signature=Operation, src = ClientIP, user = UserId, object_name=EventData, command = SearchQueryText, -time = _time
15+
| bin _time span=1hr
16+
| stats values(object_name) as object_name values(command) as command, values(src) as src, dc(command) as count, min(-time) as firstTime, max(-time) as lastTime by user,signature,_time
17+
| where count > 20 OR match(command, "(?i)password|credential|passwd|shadow|active directory|account|username|network|computer|access|MFA|bank|deposit|payroll|EFT|Electonic Funds|routing")
18+
| `security_content_ctime(firstTime)`
19+
| `security_content_ctime(lastTime)`
20+
| `o365_sharepoint_suspicious_search_behavior_filter`
2021
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events. The thresholds and match terms set within the analytic are initial guidelines and should be customized based on the organization's user behavior and risk profile. Security teams are encouraged to adjust these thresholds to optimize the balance between detecting genuine threats and minimizing false positives, ensuring the detection is tailored to their specific environment.
2122
known_false_positives: Users searching excessively or possible false positives related to matching conditions.
2223
references:
@@ -35,15 +36,21 @@ drilldown_searches:
3536
search: '`o365_management_activity` Workload=SharePoint Operation="SearchQueryPerformed" SearchQueryText=* EventData=*search* AND UserId = "$user$"'
3637
earliest_offset: $info_min_time$
3738
latest_offset: $info_max_time$
39+
rba:
40+
message: The SharePoint Online was searched suspiciously by $user$
41+
risk_objects:
42+
- field: user
43+
type: user
44+
score: 25
45+
threat_objects:
46+
- field: src
47+
type: ip_address
3848
tags:
3949
analytic_story:
4050
- Azure Active Directory Persistence
4151
- Office 365 Account Takeover
4252
- CISA AA22-320A
4353
asset_type: O365 Tenant
44-
confidence: 50
45-
impact: 50
46-
message: The SharePoint Online was searched suspiciously by $user$
4754
mitre_attack_id:
4855
- T1213.002
4956
- T1552
@@ -56,14 +63,6 @@ tags:
5663
- Splunk Enterprise
5764
- Splunk Enterprise Security
5865
- Splunk Cloud
59-
required_fields:
60-
- Workload
61-
- Operation
62-
- SearchQueryText
63-
- EventData
64-
- UserId
65-
- _time
66-
risk_score: 25
6766
security_domain: threat
6867
tests:
6968
- name: True Positive Test

0 commit comments

Comments
 (0)