You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: detections/cloud/o365_sharepoint_suspicious_search_behavior.yml
+19-20Lines changed: 19 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -8,15 +8,16 @@ type: Anomaly
8
8
description: The following analytic identifies when the O365 SharePoint users search for suspicious keywords or have an excessive number of queries within a limited timeframe. This behavior may indicate malicious actor enumeration of SharePoint based data within O365.
| stats values(object_name) as object_name values(command) as command, values(src) as src, dc(command) as count, min(-time) as firstTime, max(-time) as lastTime by user,signature,_time
16
-
| where count > 20 OR match(command, "(?i)password|credential|passwd|shadow|active directory|account|username|network|computer|access|MFA|bank|deposit|payroll|EFT|Electonic Funds|routing")
| stats values(object_name) as object_name values(command) as command, values(src) as src, dc(command) as count, min(-time) as firstTime, max(-time) as lastTime by user,signature,_time
17
+
| where count > 20 OR match(command, "(?i)password|credential|passwd|shadow|active directory|account|username|network|computer|access|MFA|bank|deposit|payroll|EFT|Electonic Funds|routing")
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events. The thresholds and match terms set within the analytic are initial guidelines and should be customized based on the organization's user behavior and risk profile. Security teams are encouraged to adjust these thresholds to optimize the balance between detecting genuine threats and minimizing false positives, ensuring the detection is tailored to their specific environment.
21
22
known_false_positives: Users searching excessively or possible false positives related to matching conditions.
22
23
references:
@@ -35,15 +36,21 @@ drilldown_searches:
35
36
search: '`o365_management_activity` Workload=SharePoint Operation="SearchQueryPerformed" SearchQueryText=* EventData=*search* AND UserId = "$user$"'
36
37
earliest_offset: $info_min_time$
37
38
latest_offset: $info_max_time$
39
+
rba:
40
+
message: The SharePoint Online was searched suspiciously by $user$
41
+
risk_objects:
42
+
- field: user
43
+
type: user
44
+
score: 25
45
+
threat_objects:
46
+
- field: src
47
+
type: ip_address
38
48
tags:
39
49
analytic_story:
40
50
- Azure Active Directory Persistence
41
51
- Office 365 Account Takeover
42
52
- CISA AA22-320A
43
53
asset_type: O365 Tenant
44
-
confidence: 50
45
-
impact: 50
46
-
message: The SharePoint Online was searched suspiciously by $user$
0 commit comments