diff --git a/rules/azure/defense_evasion_user_added_as_owner_for_azure_application.toml b/rules/azure/persistence_user_added_as_owner_for_azure_service_principal.toml similarity index 82% rename from rules/azure/defense_evasion_user_added_as_owner_for_azure_application.toml rename to rules/azure/persistence_user_added_as_owner_for_azure_service_principal.toml index 9bfd6aee4..267e91271 100644 --- a/rules/azure/defense_evasion_user_added_as_owner_for_azure_application.toml +++ b/rules/azure/persistence_user_added_as_owner_for_azure_service_principal.toml @@ -31,3 +31,18 @@ type = "query" query = ''' event.module:azure and event.dataset:azure.auditlogs and event.category:AuditLogs and azure.auditlogs.operation_name:"Add owner to service principal" and event.outcome:Success ''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1098" +name = "Account Manipulation" +reference = "https://attack.mitre.org/techniques/T1098/" + + +[rule.threat.tactic] +id = "TA0003" +name = "Persistence" +reference = "https://attack.mitre.org/tactics/TA0003/" +