Repackaged Microsoft 365, MicrosoftDefenderForEndpoint, Windows Forwarded Events (#7978)

* Repackaged

* update rule query
This commit is contained in:
v-atulyadav 2023-05-08 18:49:35 +05:30 коммит произвёл GitHub
Родитель ffa4bd7836
Коммит 30bdd35e39
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23
16 изменённых файлов: 400 добавлений и 413 удалений

Просмотреть файл

@ -1,7 +1,7 @@
id: 04384937-e927-4595-8f3c-89ff58ed231f
name: Possible STRONTIUM attempted credential harvesting - Sept 2020
name: Possible Forest Blizzard attempted credential harvesting - Sept 2020
description: |
'Surfaces potential STRONTIUM group Office365 credential harvesting attempts within OfficeActivity Logon events.
'Surfaces potential Forest Blizzard group Office365 credential harvesting attempts within OfficeActivity Logon events.
References: https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/.'
severity: Low
status: Available
@ -31,5 +31,5 @@ query: |
| where authAttempts > 2500
| extend timestamp = firstAttempt
| sort by uniqueAccounts
version: 2.0.0
version: 2.0.1
kind: Scheduled

Просмотреть файл

@ -46,13 +46,13 @@
"Analytic Rules/RareOfficeOperations.yaml",
"Analytic Rules/SharePoint_Downloads_byNewIP.yaml",
"Analytic Rules/SharePoint_Downloads_byNewUserAgent.yaml",
"Analytic Rules/StrontiumCredHarvesting.yaml",
"Analytic Rules/ForestBlizzardCredHarvesting.yaml",
"Analytic Rules/exchange_auditlogdisabled.yaml",
"Analytic Rules/office_policytampering.yaml"
],
"BasePath": "C:\\GitHub\\Azure-Sentinel\\solutions\\Microsoft 365",
"Version": "2.0.4",
"Version": "2.0.5",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1PConnector": true

Двоичные данные
Solutions/Microsoft 365/Package/2.0.5.zip Normal file

Двоичный файл не отображается.

Просмотреть файл

@ -328,13 +328,13 @@
{
"name": "analytic12",
"type": "Microsoft.Common.Section",
"label": "Possible STRONTIUM attempted credential harvesting - Sept 2020",
"label": "Possible Forest Blizzard attempted credential harvesting - Sept 2020",
"elements": [
{
"name": "analytic12-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Surfaces potential STRONTIUM group Office365 credential harvesting attempts within OfficeActivity Logon events.\nReferences: https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/."
"text": "Surfaces potential Forest Blizzard group Office365 credential harvesting attempts within OfficeActivity Logon events.\nReferences: https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/."
}
}
]

Различия файлов скрыты, потому что одна или несколько строк слишком длинны

Просмотреть файл

@ -1,7 +1,7 @@
id: 18dbdc22-b69f-4109-9e39-723d9465f45f
name: ACTINIUM AV hits - Feb 2022
name: Aqua Blizzard AV hits - Feb 2022
description: |
'Identifies a match in the Security Alert table for MDATP hits related to the ACTINIUM actor'
'Identifies a match in the Security Alert table for MDATP hits related to the Aqua Blizzard actor'
severity: High
status: Available
requiredDataConnectors:
@ -17,7 +17,7 @@ tactics:
relevantTechniques:
- T1137
tags:
- ACTINIUM
- Aqua Blizzard
query: |
let iocs = externaldata(DateAdded:string,IoC:string,Type:string) [@"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/ActiniumIOC.csv"] with (format="csv", ignoreFirstRecord=True);
let AVHits = (iocs | where Type =~ "AVDetection"| project IoC);
@ -27,7 +27,7 @@ query: |
| where ThreatName_ has_any (AVHits)
| extend Directory = tostring(parse_json(Entities)[0].Directory), SHA256 = tostring(parse_json(tostring(parse_json(Entities)[0].FileHashes))[2].Value), FileName = tostring(parse_json(Entities)[0].Name), Hostname = tostring(parse_json(Entities)[6].FQDN)| extend AccountName = tostring(parse_json(tostring(parse_json(Entities)[6].LoggedOnUsers))[0].AccountName)
| project TimeGenerated, AlertName, ThreatName_, ProviderName, AlertSeverity, Description, RemediationSteps, ExtendedProperties, Entities, FileName,SHA256, Directory, Hostname, AccountName
| extend timestamp = TimeGenerated, HostCustomEntity = Hostname , AccountCustomEntity = AccountName, FileHashCustomEntity = SHA256
| extend timestamp = TimeGenerated, HostCustomEntity = Hostname , AccountCustomEntity = AccountName, FileHashCustomEntity = SHA256, FileHashType = "SHA256"
entityMappings:
- entityType: Account
fieldMappings:
@ -43,5 +43,5 @@ entityMappings:
columnName: FileHashType
- identifier: Value
columnName: FileHashCustomEntity
version: 1.0.0
version: 1.0.1
kind: Scheduled

Просмотреть файл

@ -7,7 +7,7 @@
"Data Connectors/template_MicrosoftDefenderAdvancedThreatProtection.JSON"
],
"Analytic Rules": [
"Analytic Rules/ActiniumAVHits.yaml"
"Analytic Rules/AquaBlizzardAVHits.yaml"
],
"Parsers": [
"Parsers/AssignedIPAddress.txt",
@ -43,7 +43,7 @@
"Workbooks/MicrosoftDefenderForEndPoint.json"
],
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\MicrosoftDefenderForEndpoint",
"Version": "2.0.2",
"Version": "2.0.3",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1PConnector": true

Двоичный файл не отображается.

Просмотреть файл

@ -111,7 +111,7 @@
{
"name": "workbook1",
"type": "Microsoft.Common.Section",
"label": "MicrosoftDefenderForEndPoint",
"label": "Microsoft Defender For EndPoint",
"elements": [
{
"name": "workbook1-text",
@ -153,13 +153,13 @@
{
"name": "analytic1",
"type": "Microsoft.Common.Section",
"label": "ACTINIUM AV hits - Feb 2022",
"label": "Aqua Blizzard AV hits - Feb 2022",
"elements": [
{
"name": "analytic1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Identifies a match in the Security Alert table for MDATP hits related to the ACTINIUM actor"
"text": "Identifies a match in the Security Alert table for MDATP hits related to the Aqua Blizzard actor"
}
}
]
@ -253,4 +253,4 @@
"workspace": "[basics('workspace')]"
}
}
}
}

Различия файлов скрыты, потому что одна или несколько строк слишком длинны

Просмотреть файл

@ -1,7 +1,7 @@
id: 066395ac-ef91-4993-8bf6-25c61ab0ca5a
name: SOURGUM Actor IOC - July 2021
name: Caramel Tsunami Actor IOC - July 2021
description: |
'Identifies a match across IOC's related to an actor tracked by Microsoft as SOURGUM'
'Identifies a match across IOC's related to an actor tracked by Microsoft as Caramel Tsunami'
severity: High
status: Available
requiredDataConnectors:
@ -17,7 +17,7 @@ tactics:
relevantTechniques:
- T1546
tags:
- SOURGUM
- Caramel Tsunami
query: |
let iocs = externaldata(DateAdded:string,IoC:string,Type:string,TLP:string) [@"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/SOURGUM.csv"] with (format="csv", ignoreFirstRecord=True);
let file_path1 = (iocs | where Type =~ "filepath1" | project IoC);
@ -59,5 +59,5 @@ entityMappings:
fieldMappings:
- identifier: ProcessId
columnName: ProcessCustomEntity
version: 1.0.2
version: 1.0.3
kind: Scheduled

Просмотреть файл

@ -8,10 +8,10 @@
],
"Analytic Rules": [
"Analytic Rules/ChiaCryptoMining_WindowsEvent.yaml",
"Analytic Rules/SOURGUM_IOC_WindowsEvent.yaml"
"Analytic Rules/CaramelTsunami_IOC_WindowsEvent.yaml"
],
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Windows Forwarded Events",
"Version": "2.0.2",
"Version": "2.0.3",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1Pconnector": true

Двоичные данные
Solutions/Windows Forwarded Events/Package/2.0.3.zip Normal file

Двоичный файл не отображается.

Просмотреть файл

@ -60,7 +60,7 @@
"name": "dataconnectors1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This Solution installs the data connector for Windows Forwarded Events. You can get Windows Forwarded Events custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
"text": "The solution installs the data connector to ingest Windows Events Forwarding logs using Azure Monitoring Agent. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
}
},
{
@ -118,13 +118,13 @@
{
"name": "analytic2",
"type": "Microsoft.Common.Section",
"label": "SOURGUM Actor IOC - July 2021",
"label": "Caramel Tsunami Actor IOC - July 2021",
"elements": [
{
"name": "analytic2-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Identifies a match across IOC's related to an actor tracked by Microsoft as SOURGUM"
"text": "Identifies a match across IOC's related to an actor tracked by Microsoft as Caramel Tsunami"
}
}
]

Просмотреть файл

@ -48,7 +48,7 @@
"_analyticRulecontentId1": "[variables('analyticRulecontentId1')]",
"analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId1'))]",
"analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1')))]",
"analyticRuleVersion2": "1.0.2",
"analyticRuleVersion2": "1.0.3",
"analyticRulecontentId2": "066395ac-ef91-4993-8bf6-25c61ab0ca5a",
"_analyticRulecontentId2": "[variables('analyticRulecontentId2')]",
"analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId2'))]",
@ -57,7 +57,7 @@
"resources": [
{
"type": "Microsoft.Resources/templateSpecs",
"apiVersion": "2021-05-01",
"apiVersion": "2022-02-01",
"name": "[variables('dataConnectorTemplateSpecName1')]",
"location": "[parameters('workspace-location')]",
"tags": {
@ -71,7 +71,7 @@
},
{
"type": "Microsoft.Resources/templateSpecs/versions",
"apiVersion": "2021-05-01",
"apiVersion": "2022-02-01",
"name": "[concat(variables('dataConnectorTemplateSpecName1'),'/',variables('dataConnectorVersion1'))]",
"location": "[parameters('workspace-location')]",
"tags": {
@ -82,7 +82,7 @@
"[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]"
],
"properties": {
"description": "Windows Forwarded Events data connector with template version 2.0.2",
"description": "Windows Forwarded Events data connector with template version 2.0.3",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('dataConnectorVersion1')]",
@ -219,7 +219,7 @@
},
{
"type": "Microsoft.Resources/templateSpecs",
"apiVersion": "2021-05-01",
"apiVersion": "2022-02-01",
"name": "[variables('analyticRuleTemplateSpecName1')]",
"location": "[parameters('workspace-location')]",
"tags": {
@ -233,7 +233,7 @@
},
{
"type": "Microsoft.Resources/templateSpecs/versions",
"apiVersion": "2021-05-01",
"apiVersion": "2022-02-01",
"name": "[concat(variables('analyticRuleTemplateSpecName1'),'/',variables('analyticRuleVersion1'))]",
"location": "[parameters('workspace-location')]",
"tags": {
@ -244,7 +244,7 @@
"[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName1'))]"
],
"properties": {
"description": "ChiaCryptoMining_WindowsEvent_AnalyticalRules Analytics Rule with template version 2.0.2",
"description": "ChiaCryptoMining_WindowsEvent_AnalyticalRules Analytics Rule with template version 2.0.3",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('analyticRuleVersion1')]",
@ -286,35 +286,35 @@
],
"entityMappings": [
{
"entityType": "Account",
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
]
],
"entityType": "Account"
},
{
"entityType": "Host",
"fieldMappings": [
{
"columnName": "HostCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
],
"entityType": "Host"
},
{
"entityType": "File",
"fieldMappings": [
{
"columnName": "FileCustomEntity",
"identifier": "Name"
"identifier": "Name",
"columnName": "FileCustomEntity"
},
{
"columnName": "FilePathCustomEntity",
"identifier": "Directory"
"identifier": "Directory",
"columnName": "FilePathCustomEntity"
}
]
],
"entityType": "File"
}
]
}
@ -352,7 +352,7 @@
},
{
"type": "Microsoft.Resources/templateSpecs",
"apiVersion": "2021-05-01",
"apiVersion": "2022-02-01",
"name": "[variables('analyticRuleTemplateSpecName2')]",
"location": "[parameters('workspace-location')]",
"tags": {
@ -366,7 +366,7 @@
},
{
"type": "Microsoft.Resources/templateSpecs/versions",
"apiVersion": "2021-05-01",
"apiVersion": "2022-02-01",
"name": "[concat(variables('analyticRuleTemplateSpecName2'),'/',variables('analyticRuleVersion2'))]",
"location": "[parameters('workspace-location')]",
"tags": {
@ -377,7 +377,7 @@
"[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName2'))]"
],
"properties": {
"description": "SOURGUM_IOC_WindowsEvent_AnalyticalRules Analytics Rule with template version 2.0.2",
"description": "CaramelTsunami_IOC_WindowsEvent_AnalyticalRules Analytics Rule with template version 2.0.3",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('analyticRuleVersion2')]",
@ -391,8 +391,8 @@
"kind": "Scheduled",
"location": "[parameters('workspace-location')]",
"properties": {
"description": "Identifies a match across IOC's related to an actor tracked by Microsoft as SOURGUM",
"displayName": "SOURGUM Actor IOC - July 2021",
"description": "Identifies a match across IOC's related to an actor tracked by Microsoft as Caramel Tsunami",
"displayName": "Caramel Tsunami Actor IOC - July 2021",
"enabled": false,
"query": "let iocs = externaldata(DateAdded:string,IoC:string,Type:string,TLP:string) [@\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/SOURGUM.csv\"] with (format=\"csv\", ignoreFirstRecord=True);\nlet file_path1 = (iocs | where Type =~ \"filepath1\" | project IoC);\nlet file_path2 = (iocs | where Type =~ \"filepath2\" | project IoC);\nlet file_path3 = (iocs | where Type =~ \"filepath3\" | project IoC);\nlet reg_key = (iocs | where Type =~ \"regkey\" | project IoC);\nWindowsEvent\n| where EventID == 4688 and (EventData has_any (file_path1) or EventData has_any (file_path2) or EventData has_any (file_path3) or EventData has_any ('reg add') or EventData has_any (reg_key) )\n| extend CommandLine = tostring(EventData.CommandLine)\n| extend NewProcessName = tostring(EventData.NewProcessName)\n| extend ParentProcessName = tostring(EventData.ParentProcessName)\n| where (CommandLine has_any (file_path1)) or\n (CommandLine has_any (file_path3)) or\n (CommandLine has 'reg add' and CommandLine has_any (reg_key) and CommandLine has_any (file_path2)) or \n (NewProcessName has_any (file_path1)) or\n (NewProcessName has_any (file_path3)) or\n (ParentProcessName has_any (file_path1)) or \n (ParentProcessName has_any (file_path3)) \n| extend Account = strcat(EventData.SubjectDomainName,\"\\\\\", EventData.SubjectUserName)\n| extend NewProcessId = tostring(EventData.NewProcessId)\n| extend IPCustomEntity = tostring(EventData.IpAddress)\n| project TimeGenerated, Computer, NewProcessName, ParentProcessName, Account, NewProcessId, Type, IPCustomEntity\n| extend timestamp = TimeGenerated, HostCustomEntity = Computer , AccountCustomEntity = Account, ProcessCustomEntity = NewProcessName, Alert = 'SOURGUM IOC detected'\n",
"queryFrequency": "PT6H",
@ -419,40 +419,40 @@
],
"entityMappings": [
{
"entityType": "Account",
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
]
],
"entityType": "Account"
},
{
"entityType": "Host",
"fieldMappings": [
{
"columnName": "HostCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "HostCustomEntity"
}
]
],
"entityType": "Host"
},
{
"entityType": "IP",
"fieldMappings": [
{
"columnName": "IPCustomEntity",
"identifier": "Address"
"identifier": "Address",
"columnName": "IPCustomEntity"
}
]
],
"entityType": "IP"
},
{
"entityType": "Process",
"fieldMappings": [
{
"columnName": "ProcessCustomEntity",
"identifier": "ProcessId"
"identifier": "ProcessId",
"columnName": "ProcessCustomEntity"
}
]
],
"entityType": "Process"
}
]
}
@ -493,7 +493,7 @@
"apiVersion": "2022-01-01-preview",
"location": "[parameters('workspace-location')]",
"properties": {
"version": "2.0.2",
"version": "2.0.3",
"kind": "Solution",
"contentSchemaVersion": "2.0.0",
"contentId": "[variables('_solutionId')]",

Просмотреть файл

@ -2690,22 +2690,6 @@
"subtitle": "",
"provider": "Okta"
},
{
"workbookKey": "MicrosoftDefenderForEndPoint",
"logoFileName": "",
"description": "A wokbook to provide details about Microsoft Defender for Endpoint Advance Hunting to Overview & Analyse data brought through M365 Defender Connector.",
"dataTypesDependencies": [],
"dataConnectorsDependencies": [],
"previewImagesFileNames": [
"microsoftdefenderforendpointwhite.png",
"microsoftdefenderforendpointblack.png"
],
"version": "1.0.0",
"title": "MicrosoftDefenderForEndPoint",
"templateRelativePath": "MicrosoftDefenderForEndPoint.json",
"subtitle": "",
"provider": "Microsoft Sentinel Community"
},
{
"workbookKey": "Dynamics365Workbooks",
"logoFileName": "DynamicsLogo.svg",