Files
blue-team-tools/rules/cloud/azure/azure_app_appid_uri_changes.yml
T
Mark Morowczynski 29ca26b32c Updating MITRE Tactics & Techniques
Updating MITRE Tactics & Techniques to align with existing classifications
2023-01-28 13:26:15 -08:00

27 lines
946 B
YAML

title: Application AppID Uri Configuration Changes
id: 1b45b0d1-773f-4f23-aedc-814b759563b1
status: experimental
description: Detects when a configuration change is made to an applications AppID URI.
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-applications#appid-uri-added-modified-or-removed
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022/06/02
tags:
- attack.persistence
- attack.credential_access
- attack.privilege_escalation
- attack.t1552
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message:
- Update Application
- Update Service principal
condition: selection
falsepositives:
- When and administrator is making legitimate AppID URI configuration changes to an application. This should be a planned event.
level: high