-
Notifications
You must be signed in to change notification settings - Fork 28
/
Copy pathazureEventHub_mssql.rules
37 lines (33 loc) · 3.87 KB
/
azureEventHub_mssql.rules
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
# Sagan azureEventHub_mssql.rules
# Copyright (c) 2009-2023. Quadrant Information Security <www.quadrantsec.com>
# All rights reserved.
#
# Please submit any custom rules or ideas to [email protected] or the sagan-sigs mailing list
#
#*************************************************************
# Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
# following conditions are met:
#
# * Redistributions of source code must retain the above copyright notice, this list of conditions and the following
# disclaimer.
# * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
# following disclaimer in the documentation and/or other materials provided with the distribution.
# * Neither the name of the nor the names of its contributors may be used to endorse or promote products derived
# from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES,
# INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
#*************************************************************
# rules by "Bryant Smith" <[email protected]>
# 12/08/2023
#
# These rules are for azure mssql logs and not the onprem logs being sent through azure eventhub.
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB] Microsoft SQL Authentication Failure - Possible Brute Force [10/1]"; program:azureEventHub; json_content:".category","SQLSecurityAuditEvents"; json_content:".properties.action_name","DATABASE AUTHENTICATION FAILED"; json_map:"src_ip",".properties.client_ip"; after:track by_src,count 10,seconds 300; threshold:type suppress,track by_src, count 1, seconds 86400; xbits:set,brute-force,track ip_src,expire 28800; classtype:attempted-user; sid:5014090; rev:1; metadata:deployment Endpoint,affected_product NONE,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_01_20, updated_at 2023_01_20, mitre_tactic_id TA0006, mitre_technique_id T1110;)
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB] Microsoft SQL Login After Brute Force"; program:azureEventHub; json_content:".category","SQLSecurityAuditEvents"; json_content:".properties.action_name","DATABASE AUTHENTICATION SUCCEEDED"; json_map:"src_ip",".properties.client_ip"; xbits:isset,brute-force,track ip_src; classtype:successful-user; sid:5014091; rev:1; metadata:deployment Endpoint,affected_product NONE,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_01_20, updated_at 2023_01_20, mitre_tactic_id TA0006, mitre_technique_id T1110;)
alert any $HOME_NET any -> $HOME_NET any (msg:"[AZURE-EVENTHUB] Microsoft SQL Login from Outside Home Country"; program:azureEventHub; json_content:".category","SQLSecurityAuditEvents"; json_content:".properties.action_name","DATABASE AUTHENTICATION SUCCEEDED"; json_map:"src_ip",".properties.client_ip"; country_code:track by_src,isnot $HOME_COUNTRY; classtype:successful-user; sid:5014092; rev:1; metadata:deployment Endpoint,affected_product NONE,affected_version NONE,mitigation NONE,deprecation_reason NONE,tag NONE, created_at 2023_01_20, updated_at 2023_01_20, mitre_tactic_id TA0006, mitre_technique_id T1110;)