Skip to content

Commit b4f96f2

Browse files
authored
Merge pull request #2812 from splunk/fix_yaml_format_again
Re-add multiline formatting to make it easier to read
2 parents 222d894 + 1523746 commit b4f96f2

File tree

1 file changed

+21
-1
lines changed

1 file changed

+21
-1
lines changed

detections/endpoint/windows_steal_authentication_certificates___esc1_auth.yml

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,27 @@ data_source:
1010
- Windows Security 4887
1111
- Windows Security 4768
1212
search: >-
13-
`wineventlog_security` EventCode IN (4887) Attributes="*SAN:*upn*" Attributes="*CertificateTemplate:*" | stats count min(_time) as firstTime max(_time) as lastTime values(name) as name values(status) as status values(Subject) as ssl_subject values(SubjectKeyIdentifier) as ssl_hash by Computer, EventCode, Requester, Attributes, RequestId | rex field=Attributes "(?i)CertificateTemplate:(?<object>[^\r\n]+)" | rex field=Attributes "(?i)ccm:(?<req_src>[^\r\n]+)" | rex max_match=10 field=Attributes "(?i)(upn=(?<req_user_1>[^\r\n&]+))"| rex max_match=10 field=Attributes "(?i)(dns=(?<req_dest_1>[^\r\n&]+))"| rex field=Requester "(.+\\\\)?(?<src_user>[^\r\n]+)"| rename Attributes as object_attrs, EventCode as signature_id, name as signature, RequestId as ssl_serial, Requester as ssl_subject_common_name | eval user = lower(coalesce(req_user_1,req_user_2)) | join user [ | search `wineventlog_security` EventCode=4768 CertThumbprint=* | rename TargetUserName as user, Computer as auth_dest, IpAddress as auth_src | fields auth_src,auth_dest,user ] | eval src = upper(coalesce(auth_src,req_src)), dest = upper(coalesce(auth_dest,req_dest_1,req_dest_2)), risk_score = 90 | eval flavor_text = case(signature_id=="4887", "User account [".'user'."] authenticated after a suspicious certificate was issued for it by [".'src_user'."] using certificate request ID: ".'ssl_serial') | fields - req_* auth_* | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`| `windows_steal_authentication_certificates___esc1_authentication_filter`
13+
`wineventlog_security` EventCode IN (4887) Attributes="*SAN:*upn*" Attributes="*CertificateTemplate:*"
14+
| stats count min(_time) as firstTime max(_time) as lastTime values(name) as name values(status) as status values(Subject) as ssl_subject values(SubjectKeyIdentifier) as ssl_hash by Computer, EventCode, Requester, Attributes, RequestId
15+
| rex field=Attributes "(?i)CertificateTemplate:(?<object>[^\r\n]+)"
16+
| rex field=Attributes "(?i)ccm:(?<req_src>[^\r\n]+)"
17+
| rex max_match=10 field=Attributes "(?i)(upn=(?<req_user_1>[^\r\n&]+))"
18+
| rex max_match=10 field=Attributes "(?i)(dns=(?<req_dest_1>[^\r\n&]+))"
19+
| rex field=Requester "(.+\\\\)?(?<src_user>[^\r\n]+)"
20+
| rename Attributes as object_attrs, EventCode as signature_id, name as signature, RequestId as ssl_serial, Requester as ssl_subject_common_name
21+
| eval user = lower(coalesce(req_user_1,req_user_2))
22+
| join user
23+
[
24+
| search `wineventlog_security` EventCode=4768 CertThumbprint=*
25+
| rename TargetUserName as user, Computer as auth_dest, IpAddress as auth_src
26+
| fields auth_src,auth_dest,user
27+
]
28+
| eval src = upper(coalesce(auth_src,req_src)), dest = upper(coalesce(auth_dest,req_dest_1,req_dest_2)), risk_score = 90
29+
| eval flavor_text = case(signature_id=="4887", "User account [".'user'."] authenticated after a suspicious certificate was issued for it by [".'src_user'."] using certificate request ID: ".'ssl_serial')
30+
| fields - req_* auth_*
31+
| `security_content_ctime(firstTime)`
32+
| `security_content_ctime(lastTime)`
33+
| `windows_steal_authentication_certificates___esc1_authentication_filter`
1434
how_to_implement: To implement this analytic, enhanced Audit Logging must be enabled on AD CS and within Group Policy Management for CS server. See Page 115 of first reference. Recommend throttle correlation by RequestId/ssl_serial at minimum.
1535
known_false_positives: False positives may be generated in environments where administrative users or processes are allowed to generate certificates with Subject Alternative Names for authentication. Sources or templates used in these processes may need to be tuned out for accurate function.
1636
references:

0 commit comments

Comments
 (0)