Skip to content

Commit fab0707

Browse files
authored
Update o365_multiple_os_vendors_authenticating_from_user.yml
update to new yaml spec / update search yaml for better readability / remove single quote in SPL issues
1 parent 0d3b963 commit fab0707

File tree

1 file changed

+20
-29
lines changed

1 file changed

+20
-29
lines changed

detections/cloud/o365_multiple_os_vendors_authenticating_from_user.yml

Lines changed: 20 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,17 @@ status: production
77
type: TTP
88
description: The following analytic identifies when multiple operating systems are used to authenticate to Azure/EntraID/Office 365 by the same user account over a short period of time. This activity could be indicative of attackers enumerating various logon capabilities of Azure/EntraID/Office 365 and attempting to discover weaknesses in the organizational MFA or conditional access configurations. Usage of the tools like "MFASweep" will trigger this detection.
99
data_source:
10-
- O365
11-
search: '`o365_management_activity` Operation IN (UserLoginFailed,UserLoggedIn)
12-
| eval -time = _time
13-
| bin _time span=15m
14-
| stats values(Operation) as signature, values(ErrorNumber) as signature_id, values(OS) as os_name, dc(OS) as os_count, count, min(-time) as firstTime, max(-time) as lastTime by ClientIP, UserId, _time
15-
| where os_count >= 4
16-
| eval src = ClientIP, user = UserId
17-
| `security_content_ctime(firstTime)`
18-
| `security_content_ctime(lastTime)`
19-
| `o365_multiple_os_vendors_authenticating_from_user_filter`'
10+
- Office 365 Universal Audit Log
11+
search: |-
12+
`o365_management_activity` Operation IN (UserLoginFailed,UserLoggedIn)
13+
| eval -time = _time
14+
| bin _time span=15m
15+
| stats values(Operation) as signature, values(ErrorNumber) as signature_id, values(OS) as os_name, dc(OS) as os_count, count, min(-time) as firstTime, max(-time) as lastTime by ClientIP, UserId, _time
16+
| where os_count >= 4
17+
| eval src = ClientIP, user = UserId
18+
| `security_content_ctime(firstTime)`
19+
| `security_content_ctime(lastTime)`
20+
| `o365_multiple_os_vendors_authenticating_from_user_filter`
2021
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events. The thresholds set within the analytic (such as unique OS) are initial guidelines and should be customized based on the organization's user behavior and risk profile. Security teams are encouraged to adjust these thresholds to optimize the balance between detecting genuine threats and minimizing false positives, ensuring the detection is tailored to their specific environment.
2122
known_false_positives: IP or users where the usage of multiple Operating systems is expected, filter accordingly.
2223
references:
@@ -37,35 +38,25 @@ drilldown_searches:
3738
search: '`o365_management_activity` Operation IN (UserLoginFailed,UserLoggedIn) "$user$"'
3839
earliest_offset: $info_min_time$
3940
latest_offset: $info_max_time$
41+
rba:
42+
message: The user account $user$ authenticated with $os_count$ unique operating system types over a short period from $src$.
43+
risk_objects:
44+
- field: user
45+
type: user
46+
score: 60
47+
threat_objects:
48+
- field: src
49+
type: ip_address
4050
tags:
4151
analytic_story:
4252
- Office 365 Account Takeover
4353
asset_type: O365 Tenant
44-
confidence: 75
45-
impact: 80
46-
message: The user account $user$ authenticated with $os_count$ unique operating system types over a short period from $src$.
4754
mitre_attack_id:
4855
- T1110
49-
observable:
50-
- name: src
51-
type: IP Address
52-
role:
53-
- Attacker
54-
- name: user
55-
type: User
56-
role:
57-
- Victim
5856
product:
5957
- Splunk Enterprise
6058
- Splunk Enterprise Security
6159
- Splunk Cloud
62-
required_fields:
63-
- _time
64-
- Operation
65-
- ClientIP
66-
- UserId
67-
- OS
68-
risk_score: 60
6960
security_domain: threat
7061
tests:
7162
- name: True Positive Test

0 commit comments

Comments
 (0)