-
Notifications
You must be signed in to change notification settings - Fork 8.3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Detection Rules] Add 7.13 rules (#98975)
- Loading branch information
1 parent
0182b8d
commit 79dec09
Showing
157 changed files
with
1,861 additions
and
2,282 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
64 changes: 64 additions & 0 deletions
64
...lib/detection_engine/rules/prepackaged_rules/collection_microsoft_365_new_inbox_rule.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
{ | ||
"author": [ | ||
"Elastic", | ||
"Gary Blackwell", | ||
"Austin Songer" | ||
], | ||
"description": "Identifies when a new Inbox rule is created in Microsoft 365. Inbox rules process messages in the Inbox based on conditions and take actions, such as moving a message to a specified folder or deleting a message. Adequate permissions are required on the mailbox to create an Inbox rule.", | ||
"false_positives": [ | ||
"An inbox rule may be created by a system or network administrator. Verify that the configuration change was expected. Exceptions can be added to this rule to filter expected behavior." | ||
], | ||
"from": "now-30m", | ||
"index": [ | ||
"filebeat-*", | ||
"logs-o365*" | ||
], | ||
"language": "kuery", | ||
"license": "Elastic License v2", | ||
"name": "Microsoft 365 New Inbox Rule Created", | ||
"note": "The Microsoft 365 Fleet integration or Filebeat module must be enabled to use this rule.", | ||
"query": "event.dataset:o365.audit and event.provider:Exchange and event.category:web and event.action:\"New-InboxRule\" and event.outcome:success", | ||
"references": [ | ||
"https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account?view=o365-worldwide", | ||
"https://docs.microsoft.com/en-us/powershell/module/exchange/new-inboxrule?view=exchange-ps", | ||
"https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/detect-and-remediate-outlook-rules-forms-attack?view=o365-worldwide" | ||
], | ||
"risk_score": 21, | ||
"rule_id": "ec8efb0c-604d-42fa-ac46-ed1cfbc38f78", | ||
"severity": "low", | ||
"tags": [ | ||
"Elastic", | ||
"Cloud", | ||
"Microsoft 365", | ||
"Continuous Monitoring", | ||
"SecOps", | ||
"Configuration Audit" | ||
], | ||
"threat": [ | ||
{ | ||
"framework": "MITRE ATT&CK", | ||
"tactic": { | ||
"id": "TA0009", | ||
"name": "Collection", | ||
"reference": "https://attack.mitre.org/tactics/TA0009/" | ||
}, | ||
"technique": [ | ||
{ | ||
"id": "T1114", | ||
"name": "Email Collection", | ||
"reference": "https://attack.mitre.org/techniques/T1114/", | ||
"subtechnique": [ | ||
{ | ||
"id": "T1114.003", | ||
"name": "Email Forwarding Rule", | ||
"reference": "https://attack.mitre.org/techniques/T1114/003/" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"timestamp_override": "event.ingested", | ||
"type": "query", | ||
"version": 1 | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
58 changes: 0 additions & 58 deletions
58
...ckaged_rules/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.json
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
58 changes: 0 additions & 58 deletions
58
..._rules/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.json
This file was deleted.
Oops, something went wrong.
43 changes: 0 additions & 43 deletions
43
...ngine/rules/prepackaged_rules/command_and_control_port_8000_activity_to_the_internet.json
This file was deleted.
Oops, something went wrong.
43 changes: 0 additions & 43 deletions
43
...repackaged_rules/command_and_control_pptp_point_to_point_tunneling_protocol_activity.json
This file was deleted.
Oops, something went wrong.
43 changes: 0 additions & 43 deletions
43
...gine/rules/prepackaged_rules/command_and_control_proxy_port_activity_to_the_internet.json
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.