-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SpyCloud Enterprise Protection Initial Commit #8493
Merged
Merged
Changes from 66 commits
Commits
Show all changes
87 commits
Select commit
Hold shift + click to select a range
4863078
SpyCloud Enterprise Initial Commit
loginsoft-integrations a719fb5
Update readme.md
loginsoft-integrations ef66ba7
Add files via upload
loginsoft-integrations 07343cd
Add files via upload
loginsoft-integrations 3fb2ab3
Update readme.md
loginsoft-integrations 36bbdd2
Update azuredeploy.json
loginsoft-integrations d17070e
Update readme.md
loginsoft-integrations 966e0fa
Update readme.md
loginsoft-integrations 882f5b0
Update azuredeploy.json
loginsoft-integrations cdf48a3
Delete Solutions/SpyCloud Enterprise directory
loginsoft-integrations 9199ed0
SpyCloud Enterprise Protection Initital Commit
loginsoft-integrations e94b12b
Added SpyCloud Enterprise Logo
loginsoft-integrations 1dc4604
Delete SpyCloud Enterprise Protection directory
loginsoft-integrations 2e57fa5
SpyCloud Enterprise Solution Intitial Commit
loginsoft-integrations 0113f74
Update readme.md
loginsoft-integrations 5bd167f
Update readme.md
loginsoft-integrations 1d069f4
Update readme.md
loginsoft-integrations 77c3ff5
Update readme.md
loginsoft-integrations e144a50
Update readme.md
loginsoft-integrations 04aed1b
Update readme.md
loginsoft-integrations de131a1
Update readme.md
loginsoft-integrations 91267e5
Update readme.md
loginsoft-integrations e709b2d
Update readme.md
loginsoft-integrations 2bf0dfc
Update readme.md
loginsoft-integrations 88f0a01
Updated Logo
loginsoft-integrations 4cad51c
Removed Style attribute
loginsoft-integrations a499a28
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules/SpyCl…
loginsoft-integrations 4c85b50
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules/SpyCl…
loginsoft-integrations 5d2d17a
Converted the Analytics rules from json to yaml
loginsoft-integrations b61da43
Added Spycloud watchlist sample data for Custom logs table
loginsoft-integrations d5b8cb5
Delete azuredeploy.json
loginsoft-integrations bedd7c5
Add files via upload
loginsoft-integrations c828256
Update azuredeploy.json
loginsoft-integrations 190cbd7
Update azuredeploy.json
loginsoft-integrations 899cb2d
Update azuredeploy.json
loginsoft-integrations 350be08
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations 415fdd2
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations e86f32b
Delete SpyCloud_Watchlist_Data_CL.json
loginsoft-integrations 6ccc4a4
Add files via upload
loginsoft-integrations a8e5499
Update azuredeploy.json
loginsoft-integrations ac8821a
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations f13bef9
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations 687a3bf
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations 7b0deba
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations 2066c84
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations 4c66ccd
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations 5c9a375
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations 2c1b7ee
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations bfed50a
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules direc…
loginsoft-integrations cf86ca5
Add files via upload
loginsoft-integrations 20c8efc
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations f1f32a3
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules direc…
loginsoft-integrations c5caa31
Added the files provided by MSFT
loginsoft-integrations 56cb3a1
Delete Solutions/SpyCloud Enterprise Protection/Custom Connector dire…
loginsoft-integrations c2c9ece
moved the custom connector folder into playbooks
loginsoft-integrations 1ae6571
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules direc…
loginsoft-integrations b82dc89
Delete Solutions/SpyCloud Enterprise Protection/Playbooks directory
loginsoft-integrations 595c4e4
Files changes as per V3 tooling
loginsoft-integrations d975d37
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations 60ba91a
New Package upload
loginsoft-integrations 8f9e1cb
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations 19620db
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations 5b32e12
Delete Solutions/SpyCloud Enterprise Protection/Sample Data directory
loginsoft-integrations 23c0d20
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations ecc3bc7
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations a964778
Add files via upload
loginsoft-integrations 72ac7e9
Update SpyCloudBreachDataWatchlist.json
loginsoft-integrations 3caddfc
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations 40781ee
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations a869503
Update SpyCloudBreachDataWatchlist.json
loginsoft-integrations 83a733c
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations c6ec80e
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations fdfe199
Update azuredeploy.json
loginsoft-integrations 2bbdea6
Update azuredeploy.json
loginsoft-integrations 271b846
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations d9de2cd
Add files via upload
loginsoft-integrations 79d347c
Add files via upload
loginsoft-integrations 7347e9c
Update Solution_Spycloud_Enterprise_Protection.json
loginsoft-integrations 8f924d5
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations e16abcf
Add files via upload
loginsoft-integrations 302dc3b
Add files via upload
loginsoft-integrations 7e9713f
Delete
loginsoft-integrations 937b2f0
Update azuredeploy.json
loginsoft-integrations 6c3f47f
Update azuredeploy.json
loginsoft-integrations 341fe51
Delete Solutions/SpyCloud Enterprise Protection/Playbooks directory
loginsoft-integrations d9b77e2
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations c3c933a
Add files via upload
loginsoft-integrations File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
77 changes: 77 additions & 0 deletions
77
.script/tests/KqlvalidationsTests/CustomTables/SpyCloudBreachDataWatchlist.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
{ | ||
"Name": "SpyCloudBreachDataWatchlist_CL", | ||
"Properties": [ | ||
{ | ||
"Name": "Document_Id_g", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Domain_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Email_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "IP_Address_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Infected_Machine_Id", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Infected_Path_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Infected_Time_t", | ||
"Type": "DateTime" | ||
}, | ||
{ | ||
"Name": "Password_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Password_Plaintext_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Severity_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Source_Id_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "SpyCloud_Publish_Date_t", | ||
"Type": "DateTime" | ||
}, | ||
{ | ||
"Name": "Target_Domain_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Target_SubDomain_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Target_URL_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "User_Hostname_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "User_OS_s", | ||
"Type": "String" | ||
}, | ||
{ | ||
"Name": "Username_s", | ||
"Type": "String" | ||
} | ||
] | ||
} |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,81 @@ | ||
[{ | ||
"Document_Id": "a888d0f7-5688-471e-8230-8fd5ab903289", | ||
"Domain": "example.net", | ||
"Email": "sanitized@sanitized.com", | ||
"IP_Address": "82.66.91.250", | ||
"Infected_Machine_Id": "833ca19e-bb6e-4b42-867c-d4da26f5e47e", | ||
"Infected_Path": "C:\\Users\\Pc\\AppData\\Local\\Temp\\Rar$EXb17664.13499\\Setup.exe", | ||
"Infected_Time": "2022-05-26T00:19:15Z", | ||
"Password": "password", | ||
"Password_Plaintext": "password", | ||
"Severity": "25", | ||
"Source_Id": "45775", | ||
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z", | ||
"Target_Domain": "", | ||
"Target_SubDomain": "", | ||
"Target_URL": "127.0.0.1", | ||
"User_Hostname": "DESKTOP-R9UHSL2", | ||
"User_OS": "Windows 10 Pro [x64]", | ||
"Username": "" | ||
}, | ||
{ | ||
"Document_Id": "f4328f85-9d5d-4bdc-bd31-fb21844347eb", | ||
"Domain": "example.net", | ||
"Email": "sanitized@sanitized.com", | ||
"IP_Address": "154.118.62.47", | ||
"Infected_Machine_Id": "04a30194-1e78-4bbe-bbcf-927c5a7ff9a3", | ||
"Infected_Path": "C:\\Windows\\SysWOW64\\explorer.exe", | ||
"Infected_Time": "2021-11-10T21:52:27Z", | ||
"Password": "password", | ||
"Password_Plaintext": "password", | ||
"Severity": "25", | ||
"Source_Id": "45775", | ||
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z", | ||
"Target_Domain": "sidjisanggarrias.my.id", | ||
"Target_SubDomain": "", | ||
"Target_URL": "sidjisanggarrias.my.id", | ||
"User_Hostname": "DESKTOP-I2737MG", | ||
"User_OS": "Windows 10 Pro [x64]", | ||
"Username": "" | ||
}, | ||
{ | ||
"Document_Id": "62a47fd6-4c00-4e11-9ee1-d0d3f9b92d2a", | ||
"Domain": "example.net", | ||
"Email": "sanitized@sanitized.com", | ||
"IP_Address": "41.199.16.142", | ||
"Infected_Machine_Id": "40c31de2-d2ad-4f3b-9a7b-0506578cdd03", | ||
"Infected_Path": "C:\\Users\\CHOICE COMPUTER\\Downloads\\pswd_9787_portable-setup\\Setup.exe", | ||
"Infected_Time": "2023-01-27T21:50:06Z", | ||
"Password": "Chancery1", | ||
"Password_Plaintext": "Chancery1", | ||
"Severity": "25", | ||
"Source_Id": "45775", | ||
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z", | ||
"Target_Domain": "cytonn.com", | ||
"Target_SubDomain": "stage.careers.cytonn.com", | ||
"Target_URL": "stage.careers.cytonn.com", | ||
"User_Hostname": "DESKTOP-R2LML9F", | ||
"User_OS": "Windows 10 Pro [x64]", | ||
"Username": "" | ||
}, | ||
{ | ||
"Document_Id": "7720e6ec-ab63-441d-9b06-7551e45f8ca3", | ||
"Domain": "example.net", | ||
"Email": "sanitized@sanitized.com", | ||
"IP_Address": "41.199.16.142", | ||
"Infected_Machine_Id": "17ccfce3-b74f-4dbd-abd2-5f879caa7068", | ||
"Infected_Path": "C:\\Windows\\SysWOW64\\explorer.exe", | ||
"Infected_Time": "2021-02-11T01:45:46Z", | ||
"Password": "password@admin$", | ||
"Password_Plaintext": "password@admin$", | ||
"Severity": "25", | ||
"Source_Id": "45775", | ||
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z", | ||
"Target_Domain": "", | ||
"Target_SubDomain": "", | ||
"Target_URL": "127.0.0.1", | ||
"User_Hostname": "DESKTOP-Q8BDVTN", | ||
"User_OS": "Windows 10 Pro [x64]", | ||
"Username": "" | ||
} | ||
] |
52 changes: 52 additions & 0 deletions
52
...SpyCloud Enterprise Protection/Analytic Rules/SpyCloudEnterpriseProtectionBreachRule.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
id: cb410ad5-6e9d-4278-b963-1e3af205d680 | ||
name: SpyCloud Enterprise Breach Detection | ||
description: | | ||
'This alert creates an incident when an malware record is detected in the SpyCloud watchlist data' | ||
severity: High | ||
status: Available | ||
queryFrequency: 12h | ||
queryPeriod: 12h | ||
triggerOperator: gt | ||
triggerThreshold: 0 | ||
suppressionDuration: 5h | ||
tactics: | ||
- CredentialAccess | ||
relevantTechniques: | ||
- T1555 | ||
query: | | ||
SpyCloudBreachDataWatchlist_CL | ||
| where Severity_s == '20' | ||
| project TimeGenerated, Document_Id_g, Source_Id_s, SpyCloud_Publish_Date_t, Email_s, Domain_s, Password_s, Password_Plaintext_s, Username_s, IP_Address_s | ||
incidentConfiguration: | ||
createIncident: true | ||
groupingConfiguration: | ||
enabled: true | ||
reopenClosedIncident: false | ||
lookbackDuration: 12h | ||
matchingMethod: AllEntities | ||
eventGroupingSettings: | ||
aggregationKind: AlertPerResult | ||
alertDetailsOverride: null | ||
entityMappings: | ||
- entityType: Account | ||
fieldMappings: | ||
- identifier: FullName | ||
columnName: Email_s | ||
- entityType: Account | ||
fieldMappings: | ||
- identifier: Name | ||
columnName: Username_s | ||
- entityType: IP | ||
fieldMappings: | ||
- identifier: Address | ||
columnName: IP_Address_s | ||
customDetails: | ||
Document_Id: Document_Id_g | ||
Password: Password_s | ||
Password_Plaintext: Password_Plaintext_s | ||
Source_Id: Source_Id_s | ||
Domain: Domain_s | ||
PublishDate: SpyCloud_Publish_Date_t | ||
sentinelEntitiesMappings: null | ||
version: 1.0.0 | ||
kind: Scheduled |
71 changes: 71 additions & 0 deletions
71
...pyCloud Enterprise Protection/Analytic Rules/SpyCloudEnterpriseProtectionMalwareRule.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
id: 7ba50f9e-2f94-462b-a54b-8642b8c041f5 | ||
name: SpyCloud Enterprise Malware Detection | ||
description: | | ||
'This alert creates an incident when an malware record is detected in the SpyCloud watchlist data' | ||
severity: High | ||
status: Available | ||
queryFrequency: 12h | ||
queryPeriod: 12h | ||
triggerOperator: gt | ||
triggerThreshold: 0 | ||
suppressionDuration: 5h | ||
tactics: | ||
- CredentialAccess | ||
relevantTechniques: | ||
- T1555 | ||
query: | | ||
SpyCloudBreachDataWatchlist_CL | ||
| where Severity_s == '25' | ||
| project TimeGenerated, Document_Id_g, Source_Id_s, SpyCloud_Publish_Date_t, Email_s, Domain_s, Password_s, Password_Plaintext_s, Username_s, Infected_Machine_Id_g, Infected_Path_s, Infected_Time_t, Target_Domain_s, Target_SubDomain_s, User_Hostname_s, User_OS_s, Target_URL_s,IP_Address_s | ||
incidentConfiguration: | ||
createIncident: true | ||
groupingConfiguration: | ||
enabled: true | ||
reopenClosedIncident: false | ||
lookbackDuration: 12h | ||
matchingMethod: AllEntities | ||
eventGroupingSettings: | ||
aggregationKind: AlertPerResult | ||
alertDetailsOverride: null | ||
entityMappings: | ||
- entityType: Host | ||
fieldMappings: | ||
- identifier: HostName | ||
columnName: Infected_Machine_Id_g | ||
- entityType: Host | ||
fieldMappings: | ||
- identifier: HostName | ||
columnName: User_Hostname_s | ||
- entityType: Account | ||
fieldMappings: | ||
- identifier: FullName | ||
columnName: Email_s | ||
- entityType: Account | ||
fieldMappings: | ||
- identifier: Name | ||
columnName: Username_s | ||
- entityType: DNS | ||
fieldMappings: | ||
- identifier: DomainName | ||
columnName: Target_Domain_s | ||
- entityType: DNS | ||
fieldMappings: | ||
- identifier: DomainName | ||
columnName: Target_SubDomain_s | ||
- entityType: IP | ||
fieldMappings: | ||
- identifier: Address | ||
columnName: IP_Address_s | ||
customDetails: | ||
Document_Id: Document_Id_g | ||
Password: Password_s | ||
Password_Plaintext: Password_Plaintext_s | ||
Infected_Path: Infected_Path_s | ||
Infected_Time: Infected_Time_t | ||
Domain: Domain_s | ||
Source_Id: Source_Id_s | ||
PublishDate: SpyCloud_Publish_Date_t | ||
User_Host_Name: User_Hostname_s | ||
sentinelEntitiesMappings: null | ||
version: 1.0.0 | ||
kind: Scheduled |
26 changes: 26 additions & 0 deletions
26
Solutions/SpyCloud Enterprise Protection/Data/Solution_Spycloud_Enterprise_Protection.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
{ | ||
"Name": "SpyCloud Enterprise Protection", | ||
"Author": "SpyCloud", | ||
"Logo": "<img src=\"https://raw.githubusercontent.com/VukaHeavyIndustries/azure-sentinel/master/Logos/SpyCloud_Enterprise_Protection.svg\" width=\"75\" height=\"75\" >", | ||
"Description": "Cybercriminals continue to utilize stolen corporate credentials as the number one technique for account takeover (ATO). In fact, the FBI estimated that this resulted in estimated losses totaling more than $2.7 billion in 2022. SpyCloud helps prevent account takeover and ransomware attacks by identifying exposed credentials related to a company’s domains, IP addresses and emails. Through this integration, breach and malware data from SpyCloud can be loaded into Sentinel.", | ||
"Playbooks": [ | ||
"Playbooks/Custom Connector/azuredeploy.json", | ||
"Playbooks/SpyCloud-Breach-Playbook/azuredeploy.json", | ||
"Playbooks/SpyCloud-Get-Domain-Breach-Data-Playbook/azuredeploy.json", | ||
"Playbooks/SpyCloud-Get-Email-Breach-Data-Playbook/azuredeploy.json", | ||
"Playbooks/SpyCloud-Get-IP-Breach-Data-Playbook/azuredeploy.json", | ||
"Playbooks/SpyCloud-Get-Password-Breach-Data-Playbook/azuredeploy.json", | ||
"Playbooks/SpyCloud-Get-Username-Breach-Data-Playbook/azuredeploy.json", | ||
"Playbooks/SpyCloud-Malware-Playbook/azuredeploy.json", | ||
"Playbooks/SpyCloud-Monitor-Watchlist-Data/azuredeploy.json" | ||
], | ||
"Analytic Rules": [ | ||
"Analytic Rules/SpyCloudEnterpriseProtectionBreachRule.yaml", | ||
"Analytic Rules/SpyCloudEnterpriseProtectionMalwareRule.yaml" | ||
], | ||
"BasePath": "D:\\GitHub\\Azure-Sentinel\\Solutions\\SpyCloud Enterprise Protection", | ||
"Version": "3.0.0", | ||
"Metadata": "SolutionMetadata.json", | ||
"TemplateSpec": true, | ||
"Is1PConnector": false | ||
} |
Binary file not shown.
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please add the - "requiredDataConnectors: []" property in both the analytic rules.
Sharing Screenshot for reference -