-
Notifications
You must be signed in to change notification settings - Fork 3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #8343 from sschuur/Infoblox-3.0.0
Infoblox 3.0.0
- Loading branch information
Showing
38 changed files
with
15,346 additions
and
1,631 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
637 changes: 529 additions & 108 deletions
637
Sample Data/CEF/InfobloxCloudDataConnector-sampledata.csv
Large diffs are not rendered by default.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
66 changes: 66 additions & 0 deletions
66
Solutions/Infoblox Cloud Data Connector/Analytic Rules/Infoblox-DataExfiltrationAttack.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
id: 8db2b374-0337-49bd-94c9-cfbf8e5d83ad | ||
name: Infoblox - Data Exfiltration Attack | ||
description: | | ||
'Data exfiltration attack detected by Infoblox Threat Insight. Customize query count, scheduling, responses and more. This rule depends on a parser based on a Kusto Function to work as expected called [**InfobloxCDC**](https://aka.ms/sentinel-InfobloxCloudDataConnector-parser).' | ||
severity: Medium | ||
status: Available | ||
requiredDataConnectors: | ||
- connectorId: InfobloxCloudDataConnector | ||
dataTypes: | ||
- CommonSecurityLog (InfobloxCDC) | ||
queryFrequency: 1h | ||
queryPeriod: 1h | ||
triggerOperator: gt | ||
triggerThreshold: 0 | ||
tactics: | ||
- Impact | ||
relevantTechniques: | ||
- T1498 | ||
- T1565 | ||
query: | | ||
let threshold = 1; | ||
InfobloxCDC | ||
| where DeviceEventClassID has_cs "RPZ" | ||
| where InfobloxB1FeedName == "Threat Insight - Data Exfiltration" | ||
| summarize count() by SourceIP | ||
| where count_ > threshold | ||
| join kind=innerunique (InfobloxCDC | ||
| where DeviceEventClassID has_cs "RPZ" | ||
| where InfobloxB1FeedName == "Threat Insight - Data Exfiltration" | ||
) on SourceIP | ||
entityMappings: | ||
- entityType: IP | ||
fieldMappings: | ||
- identifier: Address | ||
columnName: SourceIP | ||
- entityType: Host | ||
fieldMappings: | ||
- identifier: HostName | ||
columnName: DeviceName | ||
- identifier: OSVersion | ||
columnName: InfobloxB1SrcOSVersion | ||
- identifier: FullName | ||
columnName: SourceUserName | ||
- entityType: Malware | ||
fieldMappings: | ||
- identifier: Name | ||
columnName: InfobloxB1FeedName | ||
- identifier: Category | ||
columnName: InfobloxB1FeedName | ||
customDetails: | ||
SourceMACAddress: SourceMACAddress | ||
InfobloxB1FeedName: InfobloxB1FeedName | ||
InfobloxB1Network: InfobloxB1Network | ||
InfobloxB1Action: InfobloxB1PolicyAction | ||
InfobloxB1PolicyName: InfobloxB1PolicyName | ||
eventGroupingSettings: | ||
aggregationKind: SingleAlert | ||
incidentConfiguration: | ||
createIncident: true | ||
groupingConfiguration: | ||
enabled: true | ||
reopenClosedIncident: true | ||
lookbackDuration: 7d | ||
matchingMethod: AllEntities | ||
version: 1.0.0 | ||
kind: Scheduled |
42 changes: 0 additions & 42 deletions
42
...ud Data Connector/Analytic Rules/Infoblox-HighNumberOfHighThreatLevelQueriesDetected.yaml
This file was deleted.
Oops, something went wrong.
43 changes: 0 additions & 43 deletions
43
...loud Data Connector/Analytic Rules/Infoblox-HighNumberOfNXDOMAINDNSResponsesDetected.yaml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
51 changes: 51 additions & 0 deletions
51
...a Connector/Analytic Rules/Infoblox-ManyHighThreatLevelQueriesFromSingleHostDetected.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
id: 3822b794-fa89-4420-aad6-0e1a2307f419 | ||
name: Infoblox - Many High Threat Level Queries From Single Host Detected | ||
description: | | ||
'At least 200 high threat level queries generated by single host in 1 hour. Queries do not need to be the same. Customize query count, scheduling, responses and more. This rule depends on a parser based on a Kusto Function to work as expected called [**InfobloxCDC**](https://aka.ms/sentinel-InfobloxCloudDataConnector-parser).' | ||
severity: Medium | ||
status: Available | ||
requiredDataConnectors: | ||
- connectorId: InfobloxCloudDataConnector | ||
dataTypes: | ||
- CommonSecurityLog (InfobloxCDC) | ||
queryFrequency: 1h | ||
queryPeriod: 1h | ||
triggerOperator: gt | ||
triggerThreshold: 0 | ||
tactics: | ||
- Impact | ||
relevantTechniques: | ||
- T1498 | ||
- T1565 | ||
query: | | ||
let threshold = 200; | ||
InfobloxCDC | ||
| where DeviceEventClassID has_cs "RPZ" | ||
| where ThreatLevel_Score >= 80 | ||
| summarize count() by SourceIP | ||
| where count_ > threshold | ||
| join kind=inner (InfobloxCDC | ||
| where DeviceEventClassID has_cs "RPZ" | ||
| where ThreatLevel_Score >= 80 | ||
) on SourceIP | ||
entityMappings: | ||
- entityType: IP | ||
fieldMappings: | ||
- identifier: Address | ||
columnName: SourceIP | ||
- entityType: Host | ||
fieldMappings: | ||
- identifier: HostName | ||
columnName: DeviceName | ||
- identifier: OSVersion | ||
columnName: InfobloxB1SrcOSVersion | ||
- identifier: FullName | ||
columnName: SourceUserName | ||
customDetails: | ||
SourceMACAddress: SourceMACAddress | ||
eventGroupingSettings: | ||
aggregationKind: SingleAlert | ||
incidentConfiguration: | ||
createIncident: true | ||
version: 1.0.0 | ||
kind: Scheduled |
Oops, something went wrong.