Skip to content

Commit a136609

Browse files
authored
Update o365_exfiltration_via_file_sync_download.yml
1 parent 38c3f57 commit a136609

File tree

1 file changed

+9
-20
lines changed

1 file changed

+9
-20
lines changed

detections/cloud/o365_exfiltration_via_file_sync_download.yml

Lines changed: 9 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -36,38 +36,27 @@ drilldown_searches:
3636
search: '`o365_management_activity` Operation IN ("filesyncdownload*") UserId="$UserId$"'
3737
earliest_offset: $info_min_time$
3838
latest_offset: $info_max_time$
39+
rba:
40+
message: The user $user$ synced an excessive number of files [$count$] from $file_path$ using $src$
41+
risk_objects:
42+
- field: user
43+
type: user
44+
score: 25
45+
threat_objects:
46+
- field: src
47+
type: src
3948
tags:
4049
analytic_story:
4150
- Data Exfiltration
4251
- Office 365 Account Takeover
4352
asset_type: O365 Tenant
44-
confidence: 50
45-
impact: 50
46-
message: The user $user$ synced an excessive number of files [$count$] from $file_path$ using $src$
4753
mitre_attack_id:
4854
- T1567
4955
- T1530
50-
observable:
51-
- name: user
52-
type: User
53-
role:
54-
- Victim
55-
- name: src
56-
type: IP Address
57-
role:
58-
- Attacker
5956
product:
6057
- Splunk Enterprise
6158
- Splunk Enterprise Security
6259
- Splunk Cloud
63-
required_fields:
64-
- _time
65-
- Operation
66-
- UserAgent
67-
- Workload
68-
- UserId
69-
- SiteUrl
70-
risk_score: 25
7160
security_domain: threat
7261
tests:
7362
- name: True Positive Test

0 commit comments

Comments
 (0)