M365用のSigmaルールにどのMITRE ATT&CKテクニックに該当するものがあるか調べてみた

Pocket

以下のサイトにある Sigmaルールがどんなものか調べてみました。

sigma/rules/cloud/m365/
https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365

以下にルール名と対応するMITRE ATT&CKの番号を記載しておきます。

1.GITHUB

audit

SigmaルールMITRE ATT&CK テクニック番号
microsoft365_disabling_mfa.yml- attack.persistence - attack.t1556
microsoft365_new_federated_domain_added_audit.yml- attack.persistence - attack.t1136.003
rules/cloud/m365/audit

Exchange

SigmaルールMITRE ATT&CK テクニック番号
microsoft365_new_federated_domain_added_exchange.yml- attack.persistence - attack.t1136.003
rules/cloud/m365/exchange

threat_detection

SigmaルールMITRE ATT&CK テクニック番号
microsoft365_from_susp_ip_addresses.yml- attack.command-and-control - attack.t1573
rules/cloud/m365/threat_detection

threat_management

SigmaルールMITRE ATT&CK テクニック番号
microsoft365_activity_by_terminated_user.yml- attack.impact
microsoft365_activity_from_anonymous_ip_addresses.yml- attack.command-and-control - attack.t1573
microsoft365_activity_from_infrequent_country.yml- attack.command-and-control - attack.t1573
microsoft365_data_exfiltration_to_unsanctioned_app.yml- attack.exfiltration - attack.t1537
microsoft365_impossible_travel_activity.yml- attack.initial-access - attack.t1078
microsoft365_logon_from_risky_ip_address.yml- attack.initial-access - attack.t1078
microsoft365_potential_ransomware_activity.yml- attack.impact - attack.t1486
microsoft365_pst_export_alert.yml- attack.collection - attack.t1114
microsoft365_pst_export_alert_using_new_compliancesearchaction.yml- attack.collection - attack.t1114
microsoft365_susp_inbox_forwarding.yml- attack.exfiltration - attack.t1020
microsoft365_susp_oauth_app_file_download_activities.yml- attack.exfiltration
microsoft365_unusual_volume_of_file_deletion.yml- attack.impact - attack.t1485
microsoft365_user_restricted_from_sending_email.yml- attack.initial-access - attack.t1199
rules/cloud/m365/threat_management

2.Splunk

Splunk社が作成したSigmaルールも多数あるので以下の通り調べてみました。

security_content/detections/cloud
https://github.com/splunk/security_content/tree/develop/detections/cloud

2.1 M365 (O365)

SigmaルールMITRE ATT&CK テクニック番号参考情報
o365_add_app_role_assignment_grant_user.ymlT1136.003
T1136
https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_Office_365_attacks
o365_added_service_principal.ymlT1136.003
T1136
https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_Office_365_attacks
o365_admin_consent_bypassed_by_service_principal.ymlT1098.003
o365_advanced_audit_disabled.ymlT1562
T1562.008
o365_application_available_to_other_tenants.ymT1098.003
T1098
o365_application_registration_owner_added.ymlT1098
o365_applicationimpersonation_role_assigned.ymlT1098
T1098.002
https://www.softbanktech.co.jp/special/blog/cloud_blog/2024/0019/
https://learn.microsoft.com/ja-jp/exchange/applicationimpersonation-role-exchange-2013-help
o365_block_user_consent_for_risky_apps_disabled.ymlT1562
o365_bypass_mfa_via_trusted_ip.ymlT1562.007
T1562
https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_Office_365_attacks
o365_compliance_content_search_exported.ymlT1114
T1114.002
This activity is significant because exporting search results can involve
sensitive or critical organizational data, potentially leading to data exfiltration.
o365_compliance_content_search_started.ymlT1114
T1114.002
This activity is significant as it may indicate an attempt to access sensitive organizational
data, including emails and documents.
o365_concurrent_sessions_from_different_ips.ymlT1185indicating potential adversary-in-the-middle (AiTM)
phishing attacks
o365_cross_tenant_access_change.ymlT1484.002
o365_disable_mfa.ymlT1556https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_Office_365_attacks
o365_dlp_rule_triggered.ymlT1048
T1567
DLPライセンス
https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/modern-work-plan-comparison—enterprise-2-2024-08-01.pdf
o365_elevated_mailbox_permission_assigned.ymlT1098
T1098.002
https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_Office_365_attacks
o365_email_access_by_security_administrator.ymlT1567
T1114
T1114.002
o365_email_reported_by_admin_found_malicious.ymlT1566
T1566.001
T1566.002
o365_email_reported_by_user_found_malicious.ymlT1566
T1566.001
T1566.002
o365_email_security_feature_changed.ymlT1562
T1562.008
T1562.001
o365_email_suspicious_behavior_alert.ymlT1114
T1114.003
o365_excessive_authentication_failures_alert.ymlT1110https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_Office_365_attacks
o365_excessive_sso_logon_errors.ymlT1556brute-force attempts or the hijacking/reuse of SSO
tokens
o365_external_guest_user_invited.ymlT1136.003External guest account invitations should be monitored by security teams
o365_external_identity_policy_changed.ymlT1136.003
o365_file_permissioned_application_consent_granted_by_user.ymlT1528
o365_fullaccessasapp_permission_assigned.ymlT1098.002
T1098.003
This activity is significant because it provides extensive control over
Office 365 operations, including access to all mailboxes and the ability to send
mail as any user.
o365_high_number_of_failed_authentications_for_user.ymlT1110
T1110.001
o365_high_privilege_role_granted.ymlT1098
T1098.003
high-privilege roles such as “Exchange
Administrator,” “SharePoint Administrator,” or “Global Administrator” are granted
o365_mail_permissioned_application_consent_granted_by_user.ymlT1528This activity is significant as it can indicate
potential security risks, such as data exfiltration or spear phishing
o365_mailbox_email_forwarding_enabled.ymlT1114
T1114.003
o365_mailbox_folder_read_permission_assigned.ymlT1098
T1098.002
o365_mailbox_folder_read_permission_granted.ymlT1098
T1098.002
o365_mailbox_inbox_folder_shared_with_all_users.ymlT1114
T1114.002
o365_mailbox_read_access_granted_to_application.ymlT1114.002
T1114
T1098
T1098.003
o365_multi_source_failed_authentications_spike.ymlT1586
T1586.003
T1110
T1110.003
T1110.004
o365_multiple_appids_and_useragents_authentication_spike.ymlT1078it may indicate
an adversary probing for multi-factor authentication weaknesses
o365_multiple_failed_mfa_requests_for_user.ymlT1621potential “MFA fatigue” attacks
ErrorNumber of 500121
o365_multiple_mailboxes_accessed_via_api.ymlT1114.002Graph APIとは
Officie 365 や Azure ADなどの情報を検索、更新できるWeb API
o365_multiple_service_principals_created_by_sp.ymlT1136.003Midnight Blizzard
o365_multiple_service_principals_created_by_user.ymlT1136.003a single user creates
more than three unique OAuth applications within a 10-minute window
o365_multiple_users_failing_to_authenticate_from_ip.ymlT1586
T1586.003
T1110
T1110.003
T1110.004
brute-force attacks or password spraying attempts
o365_new_email_forwarding_rule_created.ymlT1114
T1114.003
o365_new_email_forwarding_rule_enabled.ymlT1114
T1114.003
o365_new_federated_domain_added.ymlT1136.003
T1136
https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_Office_365_attacks
o365_new_forwarding_mailflow_rule_created.ymlT1114 : Email Collectiondetects the creation of new mail flow rules in
Office 365 that may redirect or copy emails to unauthorized or external addresses
o365_new_mfa_method_registered.ymlT1098
T1098.005
o365_oauth_app_mailbox_access_via_ews.ymlT1114.002
o365_oauth_app_mailbox_access_via_graph_api.ymlT1114.002 Email Collection: Remote Email CollectionMicrosoft Graph の AppId は “00000003-0000-0000-c000-000000000000”
https://jpazureid.github.io/blog/azure-active-directory/oauth2-application-resource-and-api-permissions/
o365_privileged_graph_api_permission_assigned.ymlT1003.002the assignment of critical Graph API permissions
in Azure AD
o365_privileged_role_assigned.ymlT1098
T1098.003
o365_privileged_role_assigned_to_service_principal.ymlT1098
T1098.003
o365_pst_export_alert.ymlT1114PST:PersonalStorageTableの略
Outlookで使用されるデータファイルの1つであり、メールやカレンダー、タスク、連絡先など、Outlookの情報を1つのファイルにまとめて保存できる便利なファイル形式です。
o365_safe_links_detection.ymlT1566
T1566.001
user has interacted with a phishing or otherwise malicious link within the Microsoft Office ecosystem
o365_security_and_compliance_alert_triggered.ymlT1078
T1078.004
o365_service_principal_new_client_credentials.ymlT1098
T1098.001
events
related to credential modifications or additions
o365_sharepoint_allowed_domains_policy_changed.ymlT1136.003
o365_sharepoint_malware_detection.ymlT1204.002 User Execution: Malicious File
T1204
malicious file is detected within the SharePoint Online ecosystem
analytic_story:
Azure Active Directory Persistence
Office 365 Account Takeover
Ransomware Cloud
o365_tenant_wide_admin_consent_granted.ymlT1098
T1098.003
o365_threat_intelligence_suspicious_email_delivered.ymlT1566
T1566.001
T1566.002
a suspicious email is detected within the Microsoft Office 365 ecosystem through the Advanced Threat Protection engine and delivered to an end user
o365_threat_intelligence_suspicious_file_detected.ymlT1204.002
T1204
a malicious file is detected within the Microsoft Office 365 ecosystem through the Advanced Threat Protection engine
o365_user_consent_blocked_for_risky_application.ymlT1528 : Steal Application Access Token
o365_user_consent_denied_for_oauth_application.ymlT1528
o365_zap_activity_detection.ymlT1566
T1566.001
T1566.002
ZAP (Zero-hour auto purge) とは、メールがユーザーのメールボックスに受信後にMicrosoft365 のセキュリティによって、スパム、フィッシング、またはマルウェアを検知してメッセージを処理する機能
detections/cloud

2.2 SharePoint

Sigmaルール
microsoft_sharepoint_server_elevation_of_privilege.ymlT1068potential exploitation attempts against
Microsoft SharePoint Server vulnerability CVE-2023-29357
detections/web/

Comments

コメントを残す

メールアドレスが公開されることはありません。 が付いている欄は必須項目です

CAPTCHA