Skip to content

Commit 9d23cc4

Browse files
committed
simplify SPL & add threat object
1 parent aedca32 commit 9d23cc4

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

detections/cloud/o365_bec_email_hiding_rule_created.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,11 @@ type: TTP
77
status: production
88
description: This analytic detects mailbox rule creation, a common technique used in Business Email Compromise. It uses a scoring mechanism to identify a combination of attributes often featured in mailbox rules created by attackers.
99
This may indicate that an attacker has gained access to the account.
10-
search: '`o365_management_activity` Workload=Exchange Operation="New-InboxRule" | rename Parameters{}.*
11-
as * | eval temp=mvzip(Name,Value, "<JOIN>") | fields - Name Value | mvexpand temp
12-
| eval temp_name=mvindex(split(temp,"<JOIN>"),0), temp_value=mvindex(split(temp,"<JOIN>"),1)
13-
| eval {temp_name}=temp_value | stats values(Name) as Name, values(MarkAsRead) as
14-
MarkAsRead, values(MoveToFolder) as MoveToFolder by _time Id user | lookup ut_shannon_lookup word as Name
15-
| eval entropy_score=if(ut_shannon<=2, 1, 0) | eval len_score=if(len(Name)<=3, 1,
16-
0) | eval read_score=if(MarkAsRead="True", 1, 0) | eval folder_score=if(match(MoveToFolder,
10+
search: '`o365_management_activity` Workload=Exchange Operation="New-InboxRule" |
11+
stats values(Name) as Name, values(MarkAsRead) as MarkAsRead, values(MoveToFolder)
12+
as MoveToFolder by _time Id user | lookup ut_shannon_lookup word as Name | eval
13+
entropy_score=if(ut_shannon<=2, 1, 0) | eval len_score=if(len(Name)<=3, 1,0) | eval
14+
read_score=if(MarkAsRead="True", 1, 0) | eval folder_score=if(match(MoveToFolder,
1715
"^(RSS|Conversation History|Archive)"), 1, 0) | eval suspicious_score=entropy_score+len_score+read_score+folder_score
1816
| where suspicious_score>2 | `o365_bec_email_hiding_rule_created_filter`'
1917
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest
@@ -38,7 +36,9 @@ rba:
3836
- field: user
3937
type: user
4038
score: 25
41-
threat_objects: []
39+
threat_objects:
40+
- field: Name
41+
type: signature
4242
tags:
4343
analytic_story:
4444
- Office 365 Account Takeover

0 commit comments

Comments
 (0)