[Rule Tuning] Fix event.action conditions - AD Rules (#3874)
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
creation_date = "2024/03/26"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -60,7 +60,7 @@ timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
any where host.os.type == "windows" and event.action == "Directory Service Changes" and
|
||||
any where host.os.type == "windows" and event.action in ("Directory Service Changes", "directory-service-object-modified") and
|
||||
event.code == "5137" and startsWith(winlog.event_data.ObjectDN, "DC=*,")
|
||||
'''
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2024/06/03"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/06/03"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -57,7 +57,7 @@ timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
any where host.os.type == "windows" and event.action == "Directory Service Changes" and
|
||||
any where host.os.type == "windows" and event.action in ("Directory Service Changes", "directory-service-object-modified") and
|
||||
event.code == "5137" and winlog.event_data.ObjectDN : "DC=wpad,*"
|
||||
'''
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2024/03/26"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -60,7 +60,7 @@ timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
any where host.os.type == "windows" and event.action == "Directory Service Changes" and
|
||||
any where host.os.type == "windows" and event.action in ("Directory Service Changes", "directory-service-object-modified") and
|
||||
event.code == "5137" and winlog.event_data.ObjectClass == "dnsNode" and
|
||||
not winlog.event_data.SubjectUserName : "*$"
|
||||
'''
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2022/11/09"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -18,7 +18,7 @@ name = "Access to a Sensitive LDAP Attribute"
|
||||
references = [
|
||||
"https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming",
|
||||
"https://social.technet.microsoft.com/wiki/contents/articles/11483.windows-credential-roaming.aspx",
|
||||
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5136",
|
||||
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662",
|
||||
]
|
||||
risk_score = 47
|
||||
rule_id = "764c9fcd-4c4c-41e6-a0c7-d6c46c2eff66"
|
||||
@@ -52,7 +52,7 @@ timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
any where event.action == "Directory Service Access" and event.code == "4662" and
|
||||
any where event.action in ("Directory Service Access", "object-operation-performed") and event.code == "4662" and
|
||||
|
||||
not winlog.event_data.SubjectUserSid : "S-1-5-18" and
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2022/01/26"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -98,7 +98,7 @@ timestamp_override = "event.ingested"
|
||||
type = "query"
|
||||
|
||||
query = '''
|
||||
event.action:"Directory Service Changes" and event.code:"5136" and
|
||||
event.action:("Directory Service Changes" or "directory-service-object-modified") and event.code:"5136" and
|
||||
winlog.event_data.AttributeLDAPDisplayName:"msDS-KeyCredentialLink" and winlog.event_data.AttributeValue :B\:828* and
|
||||
not winlog.event_data.SubjectUserName: MSOL_*
|
||||
'''
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2022/02/22"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -97,7 +97,7 @@ timestamp_override = "event.ingested"
|
||||
type = "query"
|
||||
|
||||
query = '''
|
||||
event.action:"Directory Service Changes" and event.code:5136 and
|
||||
event.action:("Directory Service Changes" or "directory-service-object-modified") and event.code:5136 and
|
||||
winlog.event_data.OperationType:"%%14674" and
|
||||
winlog.event_data.ObjectClass:"user" and
|
||||
winlog.event_data.AttributeLDAPDisplayName:"servicePrincipalName"
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2023/01/29"
|
||||
integration = ["windows", "system"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -43,7 +43,7 @@ timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
any where event.action == "Directory Service Access" and
|
||||
any where event.action in ("Directory Service Access", "object-operation-performed") and
|
||||
event.code == "4662" and not winlog.event_data.SubjectUserSid : "S-1-5-18" and
|
||||
winlog.event_data.AccessMaskDescription == "Read Property" and length(winlog.event_data.Properties) >= 2000
|
||||
'''
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2022/01/31"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -37,7 +37,7 @@ timestamp_override = "event.ingested"
|
||||
type = "query"
|
||||
|
||||
query = '''
|
||||
event.action:"Directory Service Changes" and event.code:5136 and
|
||||
event.action:("Directory Service Changes" or "directory-service-object-modified") and event.code:5136 and
|
||||
winlog.event_data.ObjectDN:CN=AdminSDHolder,CN=System*
|
||||
'''
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2022/02/24"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -98,7 +98,7 @@ timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
any where event.action == "Directory Service Changes" and
|
||||
any where event.action in ("Directory Service Changes", "directory-service-object-modified") and
|
||||
event.code == "5136" and
|
||||
winlog.event_data.AttributeLDAPDisplayName : "dSHeuristics" and
|
||||
length(winlog.event_data.AttributeValue) > 15 and
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2022/11/09"
|
||||
integration = ["system", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2024/05/21"
|
||||
updated_date = "2024/07/08"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -53,7 +53,7 @@ timestamp_override = "event.ingested"
|
||||
type = "query"
|
||||
|
||||
query = '''
|
||||
event.action:"Directory Service Changes" and event.code:"5136" and
|
||||
event.action:("Directory Service Changes" or "directory-service-object-modified") and event.code:"5136" and
|
||||
winlog.event_data.AttributeLDAPDisplayName:"msPKIAccountCredentials" and winlog.event_data.OperationType:"%%14674" and
|
||||
not winlog.event_data.SubjectUserSid : "S-1-5-18"
|
||||
'''
|
||||
|
||||
Reference in New Issue
Block a user