diff --git a/rules/o365/initial_access_o365_exchange_anti_phish_rule_mod.toml b/rules/o365/initial_access_o365_exchange_anti_phish_rule_mod.toml new file mode 100644 index 000000000..a0e674d27 --- /dev/null +++ b/rules/o365/initial_access_o365_exchange_anti_phish_rule_mod.toml @@ -0,0 +1,53 @@ +[metadata] +creation_date = "2020/11/19" +ecs_version = ["1.6.0"] +maturity = "production" +updated_date = "2020/11/19" + +[rule] +author = ["Elastic"] +description = """ +Identifies the modification of an anti-phishing rule in Office 365. By default, Office 365 includes built-in features +that help protect users from phishing attacks. Anti-phishing rules increase this protection by refining settings to +better detect and prevent attacks. +""" +false_positives = [ + """ + An anti-phishing rule may be deleted by a system or network administrator. Verify that the configuration change was + expected. Exceptions can be added to this rule to filter expected behavior. + """, +] +from = "now-30m" +index = ["filebeat-*"] +language = "kuery" +license = "Elastic License" +name = "O365 Exchange Anti-Phish Rule Modification" +note = "The O365 Fleet integration or Filebeat module must be enabled to use this rule." +references = [ + "https://docs.microsoft.com/en-us/powershell/module/exchange/remove-antiphishrule?view=exchange-ps", + "https://docs.microsoft.com/en-us/powershell/module/exchange/disable-antiphishrule?view=exchange-ps", +] +risk_score = 47 +rule_id = "97314185-2568-4561-ae81-f3e480e5e695" +severity = "medium" +tags = ["Elastic", "Cloud", "Office 365", "Continuous Monitoring", "SecOps", "Configuration Audit"] +type = "query" + +query = ''' +event.dataset:o365.audit and event.provider:Exchange and event.category:web and event.action:("Remove-AntiPhishRule" or "Disable-AntiPhishRule") and event.outcome:success +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1566" +name = "Phishing" +reference = "https://attack.mitre.org/techniques/T1566/" + + +[rule.threat.tactic] +id = "TA0001" +name = "Initial Access" +reference = "https://attack.mitre.org/tactics/TA0001/" +