Skip to content

Commit 48c0e96

Browse files
Samirbousgithub-actions[bot]
authored andcommitted
[New Rule] Suspicious Access to LDAP Attributes (#2504)
* Create discovery_high_number_ad_properties.toml * Update discovery_high_number_ad_properties.toml * Update rules/windows/discovery_high_number_ad_properties.toml Co-authored-by: Jonhnathan <[email protected]> * Update rules/windows/discovery_high_number_ad_properties.toml Co-authored-by: Jonhnathan <[email protected]> * fixed tags; moved note to setup, updated date * Update discovery_high_number_ad_properties.toml --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Jonhnathan <[email protected]> Co-authored-by: terrancedejesus <[email protected]> (cherry picked from commit f025616)
1 parent 90d2bf6 commit 48c0e96

File tree

1 file changed

+67
-0
lines changed

1 file changed

+67
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
[metadata]
2+
creation_date = "2023/01/29"
3+
integration = ["windows", "system"]
4+
maturity = "production"
5+
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
6+
min_stack_version = "8.3.0"
7+
updated_date = "2024/04/02"
8+
9+
[rule]
10+
author = ["Elastic"]
11+
description = """
12+
Identify read access to a high number of Active Directory object attributes. The knowledge of objects properties can
13+
help adversaries find vulnerabilities, elevate privileges or collect sensitive information.
14+
"""
15+
from = "now-9m"
16+
index = ["winlogbeat-*", "logs-system.security*", "logs-windows.forwarded*"]
17+
language = "eql"
18+
license = "Elastic License v2"
19+
name = "Suspicious Access to LDAP Attributes"
20+
risk_score = 73
21+
rule_id = "68ad737b-f90a-4fe5-bda6-a68fa460044e"
22+
setup = """
23+
The 'Audit Directory Service Changes' logging policy must be configured for (Success, Failure).
24+
Steps to implement the logging policy with Advanced Audit Configuration:
25+
26+
Computer Configuration >
27+
Policies >
28+
Windows Settings >
29+
Security Settings >
30+
Advanced Audit Policies Configuration >
31+
Audit Policies >
32+
DS Access >
33+
Audit Directory Service Changes (Success,Failure)
34+
"""
35+
severity = "high"
36+
tags = [
37+
"Domain: Endpoint",
38+
"OS: Windows",
39+
"Use Case: Threat Detection",
40+
"Tactic: Discovery",
41+
"Data Source: System",
42+
"Data Source: Active Directory",
43+
"Data Source: Windows",
44+
]
45+
timestamp_override = "event.ingested"
46+
type = "eql"
47+
48+
query = '''
49+
any where event.action == "Directory Service Access" and
50+
event.code == "4662" and not winlog.event_data.SubjectUserSid : "S-1-5-18" and
51+
winlog.event_data.AccessMaskDescription == "Read Property" and length(winlog.event_data.Properties) >= 2000
52+
'''
53+
54+
55+
[[rule.threat]]
56+
framework = "MITRE ATT&CK"
57+
[[rule.threat.technique]]
58+
id = "T1069"
59+
name = "Permission Groups Discovery"
60+
reference = "https://attack.mitre.org/techniques/T1069/"
61+
62+
63+
[rule.threat.tactic]
64+
id = "TA0007"
65+
name = "Discovery"
66+
reference = "https://attack.mitre.org/tactics/TA0007/"
67+

0 commit comments

Comments
 (0)