Home

Awesome

Background

<div class="clear"></div> <div class="pull-right"><img src="https://raw.githubusercontent.com/blueteam0ps/det-eng-samples/8ccc69bf3ce335447c7a7dc96c17ba8939207896/testing.png" /></div>

This repository exists to support fellow threat detection engineers by providing sample data sets. The sample data sets were created by simulated activity within the Microsoft 365 platform. Simulations were performed via PowerShell using MS API and the M365 web portal. Microsoft Extractor Suite was used to extract the logs for this project. https://github.com/invictus-ir/Microsoft-Extractor-Suite.

Current Sample Set

NoActivityMITRE TacticMITRE TechniqueMITRE Sub-TechniqueSourceAtomic Red Team Test
1Password Spraying and followed by a success - MSOLSPRAY (PowerShell)TA0006-Credential AccessT1110T1110.003AzureActiveDirectoryStsLogon
2Password Spraying and followed by a success - MSOLSPRAY (Python)TA0006-Credential AccessT1110T1110.003AzureActiveDirectoryStsLogon
3Password Spraying and followed by a success - o365spray(default module)TA0006-Credential AccessT1110T1110.003AzureActiveDirectoryStsLogon
4Password Spraying and followed by a success - o365spray(reporting module)TA0006-Credential AccessT1110T1110.003AzureActiveDirectoryStsLogon
5Use MFASweep to identify MFA status of MS ServicesTA0043-ReconnaissanceT1592T1592.004AzureActiveDirectoryStsLogon
6Discovery using Azurehound listTA0007-DiscoveryT1482-AzureActiveDirectoryStsLogon
7Set Audit Bypass For a MailboxTA0005-Defense EvasionT1562T1562.008ExchangeAdmin
8Set Mailbox Audit Log Age to ZeroTA0005-Defense EvasionT1562T1562.001ExchangeAdmin
9Disable Unified Audit Log ingestionTA0005-Defense EvasionT1562T1562.008ExchangeAdmin
10Assign Company Administrator role to a user in AzureTA0003-PersistenceT1098T1098.001Azure Active Directory
11Enable IMAP or POP for a mailboxTA0009-CollectionT1114T1114.002ExchangeAdmin
12Create external forward a mailboxTA0009-CollectionT1114T1114.003ExchangeAdmin
13Update an existing inbox ruleTA0005-Defense EvasionT1564T1564.008ExchangeAdmin
14Set a new inbox rule to delete e-mailTA0005-Defense EvasionT1564T1564.008ExchangeAdmin
15Mailbox delegation with full accessTA0003-PersistenceT1098T1098.002ExchangeAdmin
16Mailbox delegation with send as permissionTA0003-PersistenceT1098T1098.002ExchangeAdmin
17Disable MFA for a userTA0003-PersistenceT1556T1556.006Azure Active Directory
18Add ApplicationImpersonation role to an appTA0003-PersistenceT1098T1098.002ExchangeAdmin
19User removed from an admin groupTA0040-ImpactT1531-Azure Active Directory
20Remove Auditing license from a userTA0005-Defense EvasionT1562T1562.008Azure Active Directory
21Remove of a DLP Compliance PolicyTA0005-Defense EvasionT1562T1562.001Security Compliance Center
22Change Consent Permission to allow any user to allow app grantsTA0005-Defense EvasionT1550T1550.001Azure Active Directory
23App Registration for Rclone default configTA0005-Defense EvasionT1550T1550.001Azure Active Directory

Icon for the project <a href="https://www.flaticon.com/free-icons/software-testing" title="software testing icons">Software testing icons created by Freepik - Flaticon</a>