Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SpyCloud Enterprise Protection Initial Commit #8493

Merged
merged 87 commits into from
Sep 18, 2023
Merged
Show file tree
Hide file tree
Changes from 66 commits
Commits
Show all changes
87 commits
Select commit Hold shift + click to select a range
4863078
SpyCloud Enterprise Initial Commit
loginsoft-integrations Jun 21, 2023
a719fb5
Update readme.md
loginsoft-integrations Jun 22, 2023
ef66ba7
Add files via upload
loginsoft-integrations Jun 22, 2023
07343cd
Add files via upload
loginsoft-integrations Jun 22, 2023
3fb2ab3
Update readme.md
loginsoft-integrations Jun 22, 2023
36bbdd2
Update azuredeploy.json
loginsoft-integrations Jun 22, 2023
d17070e
Update readme.md
loginsoft-integrations Jun 22, 2023
966e0fa
Update readme.md
loginsoft-integrations Jun 22, 2023
882f5b0
Update azuredeploy.json
loginsoft-integrations Jun 22, 2023
cdf48a3
Delete Solutions/SpyCloud Enterprise directory
loginsoft-integrations Jul 11, 2023
9199ed0
SpyCloud Enterprise Protection Initital Commit
loginsoft-integrations Jul 11, 2023
e94b12b
Added SpyCloud Enterprise Logo
loginsoft-integrations Jul 11, 2023
1dc4604
Delete SpyCloud Enterprise Protection directory
loginsoft-integrations Jul 11, 2023
2e57fa5
SpyCloud Enterprise Solution Intitial Commit
loginsoft-integrations Jul 11, 2023
0113f74
Update readme.md
loginsoft-integrations Jul 11, 2023
5bd167f
Update readme.md
loginsoft-integrations Jul 11, 2023
1d069f4
Update readme.md
loginsoft-integrations Jul 11, 2023
77c3ff5
Update readme.md
loginsoft-integrations Jul 11, 2023
e144a50
Update readme.md
loginsoft-integrations Jul 11, 2023
04aed1b
Update readme.md
loginsoft-integrations Jul 11, 2023
de131a1
Update readme.md
loginsoft-integrations Jul 11, 2023
91267e5
Update readme.md
loginsoft-integrations Jul 11, 2023
e709b2d
Update readme.md
loginsoft-integrations Jul 11, 2023
2bf0dfc
Update readme.md
loginsoft-integrations Jul 11, 2023
88f0a01
Updated Logo
loginsoft-integrations Jul 11, 2023
4cad51c
Removed Style attribute
loginsoft-integrations Jul 11, 2023
a499a28
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules/SpyCl…
loginsoft-integrations Jul 26, 2023
4c85b50
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules/SpyCl…
loginsoft-integrations Jul 26, 2023
5d2d17a
Converted the Analytics rules from json to yaml
loginsoft-integrations Jul 26, 2023
b61da43
Added Spycloud watchlist sample data for Custom logs table
loginsoft-integrations Jul 28, 2023
d5b8cb5
Delete azuredeploy.json
loginsoft-integrations Aug 5, 2023
bedd7c5
Add files via upload
loginsoft-integrations Aug 5, 2023
c828256
Update azuredeploy.json
loginsoft-integrations Aug 5, 2023
190cbd7
Update azuredeploy.json
loginsoft-integrations Aug 5, 2023
899cb2d
Update azuredeploy.json
loginsoft-integrations Aug 5, 2023
350be08
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations Aug 5, 2023
415fdd2
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Aug 5, 2023
e86f32b
Delete SpyCloud_Watchlist_Data_CL.json
loginsoft-integrations Aug 5, 2023
6ccc4a4
Add files via upload
loginsoft-integrations Aug 5, 2023
a8e5499
Update azuredeploy.json
loginsoft-integrations Aug 5, 2023
ac8821a
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Aug 5, 2023
f13bef9
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations Aug 5, 2023
687a3bf
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations Aug 5, 2023
7b0deba
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Aug 5, 2023
2066c84
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Aug 12, 2023
4c66ccd
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations Aug 12, 2023
5c9a375
Update SpyCloudEnterpriseProtectionMalwareRule.yml
loginsoft-integrations Aug 12, 2023
2c1b7ee
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Aug 17, 2023
bfed50a
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules direc…
loginsoft-integrations Aug 17, 2023
cf86ca5
Add files via upload
loginsoft-integrations Aug 17, 2023
20c8efc
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Aug 17, 2023
f1f32a3
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules direc…
loginsoft-integrations Aug 22, 2023
c5caa31
Added the files provided by MSFT
loginsoft-integrations Aug 22, 2023
56cb3a1
Delete Solutions/SpyCloud Enterprise Protection/Custom Connector dire…
loginsoft-integrations Aug 22, 2023
c2c9ece
moved the custom connector folder into playbooks
loginsoft-integrations Aug 22, 2023
1ae6571
Delete Solutions/SpyCloud Enterprise Protection/Analytics Rules direc…
loginsoft-integrations Sep 8, 2023
b82dc89
Delete Solutions/SpyCloud Enterprise Protection/Playbooks directory
loginsoft-integrations Sep 9, 2023
595c4e4
Files changes as per V3 tooling
loginsoft-integrations Sep 9, 2023
d975d37
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations Sep 11, 2023
60ba91a
New Package upload
loginsoft-integrations Sep 11, 2023
8f9e1cb
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Sep 11, 2023
19620db
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations Sep 11, 2023
5b32e12
Delete Solutions/SpyCloud Enterprise Protection/Sample Data directory
loginsoft-integrations Sep 11, 2023
23c0d20
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Sep 11, 2023
ecc3bc7
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations Sep 11, 2023
a964778
Add files via upload
loginsoft-integrations Sep 11, 2023
72ac7e9
Update SpyCloudBreachDataWatchlist.json
loginsoft-integrations Sep 11, 2023
3caddfc
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations Sep 11, 2023
40781ee
Update SpyCloudEnterpriseProtectionBreachRule.yaml
loginsoft-integrations Sep 11, 2023
a869503
Update SpyCloudBreachDataWatchlist.json
loginsoft-integrations Sep 12, 2023
83a733c
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations Sep 12, 2023
c6ec80e
Update SpyCloudEnterpriseProtectionMalwareRule.yaml
loginsoft-integrations Sep 12, 2023
fdfe199
Update azuredeploy.json
loginsoft-integrations Sep 12, 2023
2bbdea6
Update azuredeploy.json
loginsoft-integrations Sep 12, 2023
271b846
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations Sep 12, 2023
d9de2cd
Add files via upload
loginsoft-integrations Sep 12, 2023
79d347c
Add files via upload
loginsoft-integrations Sep 12, 2023
7347e9c
Update Solution_Spycloud_Enterprise_Protection.json
loginsoft-integrations Sep 13, 2023
8f924d5
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations Sep 13, 2023
e16abcf
Add files via upload
loginsoft-integrations Sep 13, 2023
302dc3b
Add files via upload
loginsoft-integrations Sep 15, 2023
7e9713f
Delete
loginsoft-integrations Sep 15, 2023
937b2f0
Update azuredeploy.json
loginsoft-integrations Sep 15, 2023
6c3f47f
Update azuredeploy.json
loginsoft-integrations Sep 15, 2023
341fe51
Delete Solutions/SpyCloud Enterprise Protection/Playbooks directory
loginsoft-integrations Sep 16, 2023
d9b77e2
Delete Solutions/SpyCloud Enterprise Protection/Package directory
loginsoft-integrations Sep 16, 2023
c3c933a
Add files via upload
loginsoft-integrations Sep 16, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"Name": "SpyCloudBreachDataWatchlist_CL",
"Properties": [
{
"Name": "Document_Id_g",
"Type": "String"
},
{
"Name": "Domain_s",
"Type": "String"
},
{
"Name": "Email_s",
"Type": "String"
},
{
"Name": "IP_Address_s",
"Type": "String"
},
{
"Name": "Infected_Machine_Id",
"Type": "String"
},
{
"Name": "Infected_Path_s",
"Type": "String"
},
{
"Name": "Infected_Time_t",
"Type": "DateTime"
},
{
"Name": "Password_s",
"Type": "String"
},
{
"Name": "Password_Plaintext_s",
"Type": "String"
},
{
"Name": "Severity_s",
"Type": "String"
},
{
"Name": "Source_Id_s",
"Type": "String"
},
{
"Name": "SpyCloud_Publish_Date_t",
"Type": "DateTime"
},
{
"Name": "Target_Domain_s",
"Type": "String"
},
{
"Name": "Target_SubDomain_s",
"Type": "String"
},
{
"Name": "Target_URL_s",
"Type": "String"
},
{
"Name": "User_Hostname_s",
"Type": "String"
},
{
"Name": "User_OS_s",
"Type": "String"
},
{
"Name": "Username_s",
"Type": "String"
}
]
}
26 changes: 26 additions & 0 deletions Logos/SpyCloud_Enterprise_Protection.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
81 changes: 81 additions & 0 deletions Sample Data/Custom/SpyCloudBreachDataWatchlist_CL.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,81 @@
[{
"Document_Id": "a888d0f7-5688-471e-8230-8fd5ab903289",
"Domain": "example.net",
"Email": "sanitized@sanitized.com",
"IP_Address": "82.66.91.250",
"Infected_Machine_Id": "833ca19e-bb6e-4b42-867c-d4da26f5e47e",
"Infected_Path": "C:\\Users\\Pc\\AppData\\Local\\Temp\\Rar$EXb17664.13499\\Setup.exe",
"Infected_Time": "2022-05-26T00:19:15Z",
"Password": "password",
"Password_Plaintext": "password",
"Severity": "25",
"Source_Id": "45775",
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z",
"Target_Domain": "",
"Target_SubDomain": "",
"Target_URL": "127.0.0.1",
"User_Hostname": "DESKTOP-R9UHSL2",
"User_OS": "Windows 10 Pro [x64]",
"Username": ""
},
{
"Document_Id": "f4328f85-9d5d-4bdc-bd31-fb21844347eb",
"Domain": "example.net",
"Email": "sanitized@sanitized.com",
"IP_Address": "154.118.62.47",
"Infected_Machine_Id": "04a30194-1e78-4bbe-bbcf-927c5a7ff9a3",
"Infected_Path": "C:\\Windows\\SysWOW64\\explorer.exe",
"Infected_Time": "2021-11-10T21:52:27Z",
"Password": "password",
"Password_Plaintext": "password",
"Severity": "25",
"Source_Id": "45775",
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z",
"Target_Domain": "sidjisanggarrias.my.id",
"Target_SubDomain": "",
"Target_URL": "sidjisanggarrias.my.id",
"User_Hostname": "DESKTOP-I2737MG",
"User_OS": "Windows 10 Pro [x64]",
"Username": ""
},
{
"Document_Id": "62a47fd6-4c00-4e11-9ee1-d0d3f9b92d2a",
"Domain": "example.net",
"Email": "sanitized@sanitized.com",
"IP_Address": "41.199.16.142",
"Infected_Machine_Id": "40c31de2-d2ad-4f3b-9a7b-0506578cdd03",
"Infected_Path": "C:\\Users\\CHOICE COMPUTER\\Downloads\\pswd_9787_portable-setup\\Setup.exe",
"Infected_Time": "2023-01-27T21:50:06Z",
"Password": "Chancery1",
"Password_Plaintext": "Chancery1",
"Severity": "25",
"Source_Id": "45775",
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z",
"Target_Domain": "cytonn.com",
"Target_SubDomain": "stage.careers.cytonn.com",
"Target_URL": "stage.careers.cytonn.com",
"User_Hostname": "DESKTOP-R2LML9F",
"User_OS": "Windows 10 Pro [x64]",
"Username": ""
},
{
"Document_Id": "7720e6ec-ab63-441d-9b06-7551e45f8ca3",
"Domain": "example.net",
"Email": "sanitized@sanitized.com",
"IP_Address": "41.199.16.142",
"Infected_Machine_Id": "17ccfce3-b74f-4dbd-abd2-5f879caa7068",
"Infected_Path": "C:\\Windows\\SysWOW64\\explorer.exe",
"Infected_Time": "2021-02-11T01:45:46Z",
"Password": "password@admin$",
"Password_Plaintext": "password@admin$",
"Severity": "25",
"Source_Id": "45775",
"SpyCloud_Publish_Date": "2023-07-21T00:00:00Z",
"Target_Domain": "",
"Target_SubDomain": "",
"Target_URL": "127.0.0.1",
"User_Hostname": "DESKTOP-Q8BDVTN",
"User_OS": "Windows 10 Pro [x64]",
"Username": ""
}
]
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
id: cb410ad5-6e9d-4278-b963-1e3af205d680
name: SpyCloud Enterprise Breach Detection
description: |
'This alert creates an incident when an malware record is detected in the SpyCloud watchlist data'
severity: High
status: Available
queryFrequency: 12h
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please add the - "requiredDataConnectors: []" property in both the analytic rules.
Sharing Screenshot for reference -
image

queryPeriod: 12h
triggerOperator: gt
triggerThreshold: 0
suppressionDuration: 5h
tactics:
- CredentialAccess
relevantTechniques:
- T1555
query: |
SpyCloudBreachDataWatchlist_CL
| where Severity_s == '20'
| project TimeGenerated, Document_Id_g, Source_Id_s, SpyCloud_Publish_Date_t, Email_s, Domain_s, Password_s, Password_Plaintext_s, Username_s, IP_Address_s
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: true
reopenClosedIncident: false
lookbackDuration: 12h
matchingMethod: AllEntities
eventGroupingSettings:
aggregationKind: AlertPerResult
alertDetailsOverride: null
entityMappings:
- entityType: Account
fieldMappings:
- identifier: FullName
columnName: Email_s
- entityType: Account
fieldMappings:
- identifier: Name
columnName: Username_s
- entityType: IP
fieldMappings:
- identifier: Address
columnName: IP_Address_s
customDetails:
Document_Id: Document_Id_g
Password: Password_s
Password_Plaintext: Password_Plaintext_s
Source_Id: Source_Id_s
Domain: Domain_s
PublishDate: SpyCloud_Publish_Date_t
sentinelEntitiesMappings: null
version: 1.0.0
kind: Scheduled
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
id: 7ba50f9e-2f94-462b-a54b-8642b8c041f5
name: SpyCloud Enterprise Malware Detection
description: |
'This alert creates an incident when an malware record is detected in the SpyCloud watchlist data'
severity: High
status: Available
queryFrequency: 12h
queryPeriod: 12h
triggerOperator: gt
triggerThreshold: 0
suppressionDuration: 5h
tactics:
- CredentialAccess
relevantTechniques:
- T1555
query: |
SpyCloudBreachDataWatchlist_CL
| where Severity_s == '25'
| project TimeGenerated, Document_Id_g, Source_Id_s, SpyCloud_Publish_Date_t, Email_s, Domain_s, Password_s, Password_Plaintext_s, Username_s, Infected_Machine_Id_g, Infected_Path_s, Infected_Time_t, Target_Domain_s, Target_SubDomain_s, User_Hostname_s, User_OS_s, Target_URL_s,IP_Address_s
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: true
reopenClosedIncident: false
lookbackDuration: 12h
matchingMethod: AllEntities
eventGroupingSettings:
aggregationKind: AlertPerResult
alertDetailsOverride: null
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: Infected_Machine_Id_g
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: User_Hostname_s
- entityType: Account
fieldMappings:
- identifier: FullName
columnName: Email_s
- entityType: Account
fieldMappings:
- identifier: Name
columnName: Username_s
- entityType: DNS
fieldMappings:
- identifier: DomainName
columnName: Target_Domain_s
- entityType: DNS
fieldMappings:
- identifier: DomainName
columnName: Target_SubDomain_s
- entityType: IP
fieldMappings:
- identifier: Address
columnName: IP_Address_s
customDetails:
Document_Id: Document_Id_g
Password: Password_s
Password_Plaintext: Password_Plaintext_s
Infected_Path: Infected_Path_s
Infected_Time: Infected_Time_t
Domain: Domain_s
Source_Id: Source_Id_s
PublishDate: SpyCloud_Publish_Date_t
User_Host_Name: User_Hostname_s
sentinelEntitiesMappings: null
version: 1.0.0
kind: Scheduled
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
{
"Name": "SpyCloud Enterprise Protection",
"Author": "SpyCloud",
"Logo": "<img src=\"https://raw.githubusercontent.com/VukaHeavyIndustries/azure-sentinel/master/Logos/SpyCloud_Enterprise_Protection.svg\" width=\"75\" height=\"75\" >",
"Description": "Cybercriminals continue to utilize stolen corporate credentials as the number one technique for account takeover (ATO). In fact, the FBI estimated that this resulted in estimated losses totaling more than $2.7 billion in 2022. SpyCloud helps prevent account takeover and ransomware attacks by identifying exposed credentials related to a company’s domains, IP addresses and emails. Through this integration, breach and malware data from SpyCloud can be loaded into Sentinel.",
"Playbooks": [
"Playbooks/Custom Connector/azuredeploy.json",
"Playbooks/SpyCloud-Breach-Playbook/azuredeploy.json",
"Playbooks/SpyCloud-Get-Domain-Breach-Data-Playbook/azuredeploy.json",
"Playbooks/SpyCloud-Get-Email-Breach-Data-Playbook/azuredeploy.json",
"Playbooks/SpyCloud-Get-IP-Breach-Data-Playbook/azuredeploy.json",
"Playbooks/SpyCloud-Get-Password-Breach-Data-Playbook/azuredeploy.json",
"Playbooks/SpyCloud-Get-Username-Breach-Data-Playbook/azuredeploy.json",
"Playbooks/SpyCloud-Malware-Playbook/azuredeploy.json",
"Playbooks/SpyCloud-Monitor-Watchlist-Data/azuredeploy.json"
],
"Analytic Rules": [
"Analytic Rules/SpyCloudEnterpriseProtectionBreachRule.yaml",
"Analytic Rules/SpyCloudEnterpriseProtectionMalwareRule.yaml"
],
"BasePath": "D:\\GitHub\\Azure-Sentinel\\Solutions\\SpyCloud Enterprise Protection",
"Version": "3.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1PConnector": false
}
Binary file not shown.
Loading
Loading