Skip to content

Commit 99ecdbc

Browse files
authored
Merge pull request #2800 from splunk/observablefix
Updates to Observable!
2 parents f9b7d09 + a474fb4 commit 99ecdbc

File tree

4 files changed

+36
-52
lines changed

4 files changed

+36
-52
lines changed

detections/cloud/o365_added_service_principal.yml

Lines changed: 11 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,13 @@
11
name: O365 Added Service Principal
22
id: 1668812a-6047-11eb-ae93-0242ac130002
3-
version: 2
3+
version: 3
44
date: '2023-08-02'
55
author: Rod Soto, Splunk
66
status: production
77
type: TTP
8-
description: This search detects the creation of a new Federation setting by alerting
9-
about an specific event related to its creation.
8+
description: The following analytic detects addition of new service principal accounts added to O365 tenants. Attackers can abuse service principals in Office 365 (now known as Microsoft 365) to gain unauthorized access and perform malicious actions within an organization's environment. Service principals are essentially non-human accounts used by applications, services, or scripts to access resources and interact with APIs on behalf of the organization.
109
data_source: []
11-
search: '`o365_management_activity` Workload=AzureActiveDirectory Operation="*Add service principal*" OR (Operation = "*principal*" AND action = "created")
12-
| stats count by src_user src_user_type action Operation authentication_service Workload
13-
| `security_content_ctime(firstTime)`
14-
| `security_content_ctime(lastTime)`
15-
| `o365_added_service_principal_filter`'
10+
search: '`o365_management_activity` Workload=AzureActiveDirectory Operation="*Add service principal*" OR (Operation = "*principal*" AND action = "created") | stats count values(ModifiedProperties{}.NewValue) as new_value by src_user src_user_type action Operation authentication_service Workload | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `o365_added_service_principal_filter`'
1611
how_to_implement: You must install splunk Microsoft Office 365 add-on. This search
1712
works with o365:management:activity
1813
known_false_positives: The creation of a new Federation is not necessarily malicious,
@@ -30,18 +25,13 @@ tags:
3025
asset_type: Office 365
3126
confidence: 60
3227
impact: 70
33-
message: User $Actor.ID$ created a new federation setting on $Target.ID$ and added
34-
service principal credentials from IP Address $ActorIpAddress$
28+
message: User $src_user$ has created new service principal $new_value$ in AzureActiveDirectory
3529
mitre_attack_id:
3630
- T1136.003
3731
- T1136
3832
observable:
39-
- name: ActorIpAddress
40-
type: IP Address
41-
role:
42-
- Attacker
43-
- name: Target.ID
44-
type: Endpoint
33+
- name: src_user
34+
type: User
4535
role:
4636
- Victim
4737
product:
@@ -52,11 +42,11 @@ tags:
5242
- _time
5343
- Workload
5444
- signature
55-
- Actor{}.ID
56-
- ModifiedProperties{}.Name
57-
- ModifiedProperties{}.NewValue
58-
- Target{}.ID
59-
- ActorIpAddress
45+
- src_user
46+
- src_user_type
47+
- action
48+
- Operation
49+
- authentication_service
6050
risk_score: 42
6151
security_domain: threat
6252
tests:

detections/cloud/o365_excessive_sso_logon_errors.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,15 @@
11
name: O365 Excessive SSO logon errors
22
id: 8158ccc4-6038-11eb-ae93-0242ac130002
3-
version: 2
3+
version: 3
44
date: '2023-08-02'
55
author: Rod Soto, Splunk
66
status: production
77
type: Anomaly
8-
description: This search detects accounts with high number of Single Sign ON (SSO)
8+
description: The following analytic detects accounts with high number of Single Sign ON (SSO)
99
logon errors. Excessive logon errors may indicate attempts to bruteforce of password
1010
or single sign on token hijack or reuse.
1111
data_source: []
12-
search: '`o365_management_activity` Workload=AzureActiveDirectory LogonError=*Sso* Operation=UserLoginFailed
13-
| stats count min(_time) as firstTime max(_time) as lastTime by LogonError ActorIpAddress UserAgent UserId Operation Workload
14-
| where count >= 5
15-
| `security_content_ctime(firstTime)`
16-
| `security_content_ctime(lastTime)`
17-
| `o365_excessive_sso_logon_errors_filter`'
12+
search: '`o365_management_activity` Workload=AzureActiveDirectory LogonError=*Sso* Operation=UserLoginFailed | stats count min(_time) as firstTime max(_time) as lastTime by user src_ip LogonError user_agent UserId Operation Workload authentication_method authentication_service| where count >= 5 | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `o365_excessive_sso_logon_errors_filter`'
1813
how_to_implement: You must install splunk Microsoft Office 365 add-on. This search
1914
works with o365:management:activity
2015
known_false_positives: Logon errors may not be malicious in nature however it may
@@ -28,16 +23,16 @@ tags:
2823
asset_type: Office 365
2924
confidence: 80
3025
impact: 80
31-
message: User $UserId$ has caused excessive number of SSO logon errors from $ActorIpAddress$
26+
message: User $user$ has caused excessive number of SSO logon errors from $src_ip$
3227
using UserAgent $UserAgent$.
3328
mitre_attack_id:
3429
- T1556
3530
observable:
36-
- name: ActorIpAddress
31+
- name: src_ip
3732
type: IP Address
3833
role:
3934
- Attacker
40-
- name: UserId
35+
- name: user
4136
type: User
4237
role:
4338
- Victim
@@ -47,11 +42,16 @@ tags:
4742
- Splunk Cloud
4843
required_fields:
4944
- _time
45+
- user
46+
- src_ip
5047
- Workload
5148
- LogonError
5249
- ActorIpAddress
5350
- UserAgent
5451
- UserId
52+
- authentication_service
53+
- authentication_method
54+
- Operation
5555
risk_score: 64
5656
security_domain: threat
5757
tests:

detections/cloud/o365_new_federated_domain_added.yml

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ date: '2023-08-02'
55
author: Rod Soto, Splunk
66
status: production
77
type: TTP
8-
description: This search detects the addition of a new Federated domain.
8+
description: The following search detects the addition of a new Federated domain in O365 environments. If an attacker adds an unverified domain to Office 365, they may gain unauthorized access to the organization's email and other services, potentially leading to data breaches and information theft. It can be misused to set up adversary infrastruture for phishing, spoofing emails and malware distribution.
99
data_source: []
10-
search: '`o365_management_activity` Operation IN("*add*", "*new*") AND Operation="*domain*"
11-
| stats count by Workload Operation Target{}.ID Actor{}.ID
10+
search: '`o365_management_activity` Operation IN ("*add*", "*new*") AND Operation="*domain*"
11+
| stats count values(ModifiedProperties{}.NewValue) as new_value by user user_agent authentication_service action Workload Operation
1212
| `security_content_ctime(firstTime)`
1313
| `security_content_ctime(lastTime)`
1414
| `o365_new_federated_domain_added_filter`'
@@ -30,17 +30,12 @@ tags:
3030
asset_type: Office 365
3131
confidence: 80
3232
impact: 80
33-
message: User $UserId$ has added a new federated domaain $Parameters.Value$ for
34-
$OrganizationName$
33+
message: User $user$ has added a new federated domain $new_value$
3534
mitre_attack_id:
3635
- T1136.003
3736
- T1136
3837
observable:
39-
- name: OrganizationName
40-
type: Other
41-
role:
42-
- Victim
43-
- name: UserId
38+
- name: user
4439
type: User
4540
role:
4641
- Victim
@@ -52,12 +47,11 @@ tags:
5247
- _time
5348
- Workload
5449
- Operation
55-
- Parameters{}.Value
56-
- ObjectId
57-
- OrganizationName
58-
- OriginatingServer
59-
- UserId
60-
- UserKey
50+
- ModifiedProperties{}.NewValue
51+
- authentication_service
52+
- user
53+
- user_agent
54+
- action
6155
risk_score: 64
6256
security_domain: threat
6357
tests:

detections/endpoint/windows_powershell_remotesigned_file.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
88
data_source:
9-
- Sysmon EventCode 1
9+
- Sysmon Event ID 1
1010
description: This analytic identifies the use of "remotesigned" execution policy for a file.
1111
This security setting determines whether PowerShell scripts can be executed on a computer.
1212
When the execution policy is set to "remotesigned," it allows locally created scripts to run without any restrictions,
@@ -31,16 +31,16 @@ tags:
3131
asset_type: Endpoint
3232
confidence: 50
3333
impact: 50
34-
message: A PowerShell commandline to remotesigned a powershell script in $dest$,
34+
message: A PowerShell commandline with remotesigned policy executed on $dest$
3535
mitre_attack_id:
3636
- T1059.001
3737
- T1059
3838
observable:
39-
- name: Computer
39+
- name: dest
4040
type: Hostname
4141
role:
4242
- Victim
43-
- name: User
43+
- name: user
4444
type: User
4545
role:
4646
- Victim

0 commit comments

Comments
 (0)