Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

0xC0FFEEEE - O365 Suspicious Mailbox Rule Created #3336

Open
wants to merge 13 commits into
base: develop
Choose a base branch
from

Conversation

0xC0FFEEEE
Copy link
Contributor

Details

Adding a detection for a common technique employed during BEC.

Checklist

  • Validate name matches <platform>_<mitre att&ck technique>_<short description> nomenclature
  • CI/CD jobs passed ✔️
  • Validated SPL logic.
  • Validated tags, description, and how to implement.
  • Verified references match analytic.
  • Confirm updates to lookups are handled properly.

Notes For Submitters and Reviewers

Associated test data - splunk/attack_data#962

@patel-bhavin
Copy link
Contributor

Hello @0xC0FFEEEE : Thank you for the PR! We have a similar detection in the repo - O365 New Email Forwarding Rule Created . Curious to know if we can improve the current one here :

description: The following analytic identifies the creation of new email forwarding

@0xC0FFEEEE
Copy link
Contributor Author

Hey @patel-bhavin

I think the intent of this detection is different enough that both can co-exist.

I created this one with the specific aim of alerting on the defense evasion technique T1564.008, whereas the existing detection covers T1114.003.

It's also worth pointing out that the brilliant and prolific @nterl0k has an open PR #3292 with a very similar detection as well. I've tested both side by side against our production data and mine produced fewer false positives over a 7 day period by quite a margin, something like 350 vs 5.

Happy to take your lead, but I think it might be challenging to merge both, or all 3 detections without muddying the waters between two very different attacker intents.

I think there's potentially a place for all 3, with @nterl0k's as a hunting rule, thoughts?

@nterl0k
Copy link
Contributor

nterl0k commented Feb 19, 2025 via email

Copy link
Collaborator

@pyth0n1c pyth0n1c left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We do not ship ANY detections enabled_by_Default.

@pyth0n1c pyth0n1c marked this pull request as draft February 19, 2025 01:14
@pyth0n1c pyth0n1c added the WIP DO NOT MERGE Work in Progress label Feb 19, 2025
@0xC0FFEEEE 0xC0FFEEEE marked this pull request as ready for review February 19, 2025 08:05
@0xC0FFEEEE 0xC0FFEEEE requested a review from pyth0n1c February 19, 2025 08:10
@patel-bhavin
Copy link
Contributor

patel-bhavin commented Feb 19, 2025

@nterl0k @0xC0FFEEEE - thanks both for quickly jumping on deconflicting these detections and details. I largely agree with you both and i think @nterl0k we should make the other detection as hunting and perhaps keep all three detections. Changing this to hunting will also help simplify the purpose of different types of same analytic!

patel-bhavin
patel-bhavin previously approved these changes Feb 19, 2025
Copy link
Collaborator

@pyth0n1c pyth0n1c left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just some small changes to the how to implement field.

@josehelps josehelps added this to the v5.2.0 milestone Feb 20, 2025
@dluxtron
Copy link
Collaborator

I have no idea why I'm here right looking at this right now, but would it be possible to include the rule Name as the desc threat object like @nterl0k does?

Very good linkage, the past few campaigns I saw all reused rule names. I could see the rule names being used in threat intel.

I like these detections a lot.

@0xC0FFEEEE
Copy link
Contributor Author

@dluxtron thanks for your feedback!

Added the rule name as a threat object as requested.

I also realized I didn't need to jump through various hoops to extract the nested Parameters.Names & Parameters.Values fieldnames/values using mvzip & mvexpand so I've simplified the SPL while I was there.

@0xC0FFEEEE 0xC0FFEEEE requested a review from pyth0n1c March 1, 2025 09:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Detections WIP DO NOT MERGE Work in Progress
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants