From 230b59dfc9de8602fd0a75786cc59bb9bfcac521 Mon Sep 17 00:00:00 2001 From: David French <56409778+threat-punter@users.noreply.github.com> Date: Fri, 4 Sep 2020 08:36:20 -0600 Subject: [PATCH] rule-tuning-user-added-as-owner-for-azure-service-principal (#258) --- ...ded_as_owner_for_azure_service_principal.toml} | 15 +++++++++++++++ 1 file changed, 15 insertions(+) rename rules/azure/{defense_evasion_user_added_as_owner_for_azure_application.toml => persistence_user_added_as_owner_for_azure_service_principal.toml} (82%) diff --git a/rules/azure/defense_evasion_user_added_as_owner_for_azure_application.toml b/rules/azure/persistence_user_added_as_owner_for_azure_service_principal.toml similarity index 82% rename from rules/azure/defense_evasion_user_added_as_owner_for_azure_application.toml rename to rules/azure/persistence_user_added_as_owner_for_azure_service_principal.toml index 9bfd6aee4..267e91271 100644 --- a/rules/azure/defense_evasion_user_added_as_owner_for_azure_application.toml +++ b/rules/azure/persistence_user_added_as_owner_for_azure_service_principal.toml @@ -31,3 +31,18 @@ type = "query" query = ''' event.module:azure and event.dataset:azure.auditlogs and event.category:AuditLogs and azure.auditlogs.operation_name:"Add owner to service principal" and event.outcome:Success ''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1098" +name = "Account Manipulation" +reference = "https://attack.mitre.org/techniques/T1098/" + + +[rule.threat.tactic] +id = "TA0003" +name = "Persistence" +reference = "https://attack.mitre.org/tactics/TA0003/" +