Skip to content

Commit fa6f09b

Browse files
committed
fixing up yamls for testing
1 parent 0a1c14d commit fa6f09b

8 files changed

+68
-24
lines changed

detections/cloud/azure_ad_azurehound_useragent_detected.yml

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,15 @@ references:
2121
- https://github.com/SpecterOps/AzureHound
2222
- https://splunkbase.splunk.com/app/3110
2323
- https://docs.splunk.com/Documentation/AddOns/released/MSCloudServices/Install
24+
drilldown_searches:
25+
- name: View the detection results for - "$user$"
26+
search: '%original_detection_search% | search user = "$user$"'
27+
earliest_offset: $info_min_time$
28+
latest_offset: $info_max_time$
29+
- name: View risk events for the last 7 days for - "$user$"
30+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
31+
earliest_offset: $info_min_time$
32+
latest_offset: $info_max_time$
2433
tags:
2534
analytic_story:
2635
- Azure Active Directory Privilege Escalation
@@ -33,16 +42,16 @@ tags:
3342
- T1087.004
3443
- T1526
3544
observable:
36-
- name: src
37-
type: IP Address
38-
role:
39-
- Attacker
4045
- name: user
4146
type: User
4247
role:
48+
- Victim
49+
- name: src
50+
type: IP Address
51+
role:
4352
- Attacker
4453
- name: user_agent
45-
type: User Agent
54+
type: Other
4655
role:
4756
- Attacker
4857
product:
@@ -61,3 +70,4 @@ tests:
6170
attack_data:
6271
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1087.004/azurehound/azurehound.log
6372
sourcetype: azure:monitor:aad
73+
source: Azure AD

detections/cloud/azure_ad_service_principal_enumeration.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,15 @@ references:
2626
- https://github.com/dirkjanm/ROADtools
2727
- https://splunkbase.splunk.com/app/3110
2828
- https://docs.splunk.com/Documentation/AddOns/released/MSCloudServices/Install
29+
drilldown_searches:
30+
- name: View the detection results for - "$user$"
31+
search: '%original_detection_search% | search user = "$user$"'
32+
earliest_offset: $info_min_time$
33+
latest_offset: $info_max_time$
34+
- name: View risk events for the last 7 days for - "$user$"
35+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
36+
earliest_offset: $info_min_time$
37+
latest_offset: $info_max_time$
2938
tags:
3039
analytic_story:
3140
- Azure Active Directory Privilege Escalation
@@ -45,9 +54,9 @@ tags:
4554
- name: user
4655
type: User
4756
role:
48-
- Attacker
57+
- Victim
4958
- name: user_agent
50-
type: User Agent
59+
type: Other
5160
role:
5261
- Attacker
5362
product:
@@ -66,3 +75,4 @@ tests:
6675
attack_data:
6776
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1087.004/azurehound/azurehound.log
6877
sourcetype: azure:monitor:aad
78+
source: Azure AD

detections/cloud/azure_ad_service_principal_privilege_escalation.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,15 @@ references:
2626
- https://github.com/mvelazc0/BadZure
2727
- https://www.splunk.com/en_us/blog/security/hunting-m365-invaders-navigating-the-shadows-of-midnight-blizzard.html
2828
- https://posts.specterops.io/microsoft-breach-what-happened-what-should-azure-admins-do-da2b7e674ebc
29+
drilldown_searches:
30+
- name: View the detection results for - "$servicePrincipal$"
31+
search: '%original_detection_search% | search servicePrincipal = "$servicePrincipal$"'
32+
earliest_offset: $info_min_time$
33+
latest_offset: $info_max_time$
34+
- name: View risk events for the last 7 days for - "$servicePrincipal$"
35+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$servicePrincipal$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
36+
earliest_offset: $info_min_time$
37+
latest_offset: $info_max_time$
2938
tags:
3039
analytic_story:
3140
- Azure Active Directory Privilege Escalation
@@ -40,9 +49,9 @@ tags:
4049
- name: servicePrincipal
4150
type: User
4251
role:
43-
- Attacker
52+
- Victim
4453
- name: user_agent
45-
type: User Agent
54+
type: Other
4655
role:
4756
- Attacker
4857
product:
@@ -68,3 +77,4 @@ tests:
6877
attack_data:
6978
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1098.003/azure_ad_spn_privesc/azure_ad_spn_privesc.log
7079
sourcetype: azure:monitor:aad
80+
source: Azure AD

detections/cloud/microsoft_intune_device_health_scripts.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ tags:
4040
- name: user
4141
type: User
4242
role:
43-
- Attacker
43+
- Victim
4444
- name: TargetObjectId
45-
type: TargetObjectId
45+
type: Other
4646
role:
47-
- Object
47+
- Attacker
4848
product:
4949
- Splunk Enterprise
5050
- Splunk Enterprise Security
@@ -59,4 +59,5 @@ tests:
5959
- name: True Positive Test
6060
attack_data:
6161
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1072/intune/intune.log
62-
sourcetype: azure:monitor:activity
62+
sourcetype: azure:monitor:activity
63+
source: Azure AD

detections/cloud/microsoft_intune_devicemanagementconfigurationpolicies.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,11 +43,11 @@ tags:
4343
- name: user
4444
type: User
4545
role:
46-
- Attacker
46+
- Victim
4747
- name: TargetObjectId
48-
type: TargetObjectId
48+
type: Other
4949
role:
50-
- Object
50+
- Attacker
5151
product:
5252
- Splunk Enterprise
5353
- Splunk Enterprise Security
@@ -63,3 +63,4 @@ tests:
6363
attack_data:
6464
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1072/intune/intune.log
6565
sourcetype: azure:monitor:activity
66+
source: Azure AD

detections/cloud/microsoft_intune_manual_device_management.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,11 +41,11 @@ tags:
4141
- name: user
4242
type: User
4343
role:
44-
- Attacker
44+
- Victim
4545
- name: TargetObjectId
46-
type: TargetObjectId
46+
type: Other
4747
role:
48-
- Object
48+
- Attacker
4949
product:
5050
- Splunk Enterprise
5151
- Splunk Enterprise Security
@@ -61,3 +61,4 @@ tests:
6161
attack_data:
6262
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1072/intune/intune.log
6363
sourcetype: azure:monitor:activity
64+
source: Azure AD

detections/cloud/microsoft_intune_mobile_apps.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ tags:
4242
role:
4343
- Attacker
4444
- name: TargetObjectId
45-
type: TargetObjectId
45+
type: Other
4646
role:
47-
- Object
47+
- Attacker
4848
product:
4949
- Splunk Enterprise
5050
- Splunk Enterprise Security
@@ -60,3 +60,4 @@ tests:
6060
attack_data:
6161
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1072/intune/intune.log
6262
sourcetype: azure:monitor:activity
63+
source: Azure AD

detections/cloud/o365_service_principal_privilege_escalation.yml

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,23 @@ search: >-
1515
| spath input=targetServicePrincipal path=NewValue output=targetServicePrincipal
1616
| where servicePrincipal=targetServicePrincipal
1717
| table _time Operation servicePrincipal servicePrincipalId appRole targetAppContext user_agent tenant_id InterSystemsId
18-
| `o365_service_principal_privilege_escalation_filter
18+
| `o365_service_principal_privilege_escalation_filter`
1919
how_to_implement: The Splunk Add-on for Microsoft Office 365 add-on is required to ingest EntraID audit logs via the 365 API. See references for links for further details on how to onboard this log source.
2020
known_false_positives: Unknown
2121
references:
2222
- https://splunkbase.splunk.com/app/4055
2323
- https://github.com/mvelazc0/BadZure
2424
- https://www.splunk.com/en_us/blog/security/hunting-m365-invaders-navigating-the-shadows-of-midnight-blizzard.html
2525
- https://posts.specterops.io/microsoft-breach-what-happened-what-should-azure-admins-do-da2b7e674ebc
26+
drilldown_searches:
27+
- name: View the detection results for - "$servicePrincipal$"
28+
search: '%original_detection_search% | search servicePrincipal = "$servicePrincipal$"'
29+
earliest_offset: $info_min_time$
30+
latest_offset: $info_max_time$
31+
- name: View risk events for the last 7 days for - "$servicePrincipal$"
32+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$servicePrincipal$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
33+
earliest_offset: $info_min_time$
34+
latest_offset: $info_max_time$
2635
tags:
2736
analytic_story:
2837
- Azure Active Directory Privilege Escalation
@@ -38,9 +47,9 @@ tags:
3847
- name: servicePrincipal
3948
type: User
4049
role:
41-
- Attacker
50+
- Victim
4251
- name: user_agent
43-
type: User Agent
52+
type: Other
4453
role:
4554
- Attacker
4655
product:
@@ -63,3 +72,4 @@ tests:
6372
attack_data:
6473
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1098.003/o365_spn_privesc/o365_spn_privesc.log
6574
sourcetype: o365:management:activity
75+
source: Office 365

0 commit comments

Comments
 (0)