Skip to content

Commit

Permalink
Exposure Management + Defender for Office 365.kql
Browse files Browse the repository at this point in the history
  • Loading branch information
SlimKQL authored Aug 25, 2024
1 parent 087284d commit 961e7ab
Showing 1 changed file with 12 additions and 0 deletions.
12 changes: 12 additions & 0 deletions DefenderXDR/Exposure Management + Defender for Office 365.kql
Original file line number Diff line number Diff line change
Expand Up @@ -17,3 +17,15 @@ AlertInfo
| join EmailEvents on NetworkMessageId
| where RecipientEmailAddress has_any (CriticalIdentities)

// MITRE ATT&CK Mapping

// Based on the analysis, the following MITRE ATT&CK techniques are relevant:

// T1071.001 - Application Layer Protocol: Web Protocols
// The detection of a potentially malicious URL click involves monitoring web protocols, which falls under this technique.
// T1566.002 - Phishing: Spearphishing Link
// The alert for a potentially malicious URL click is indicative of spearphishing attempts, where attackers use malicious links to compromise targets.
// T1078 - Valid Accounts
// The focus on critical identities and their email addresses suggests monitoring for the use of valid accounts, which is relevant to this technique.
// T1087.002 - Account Discovery: Domain Account
// The query’s identification of critical identities involves discovering domain accounts, aligning with this technique.

0 comments on commit 961e7ab

Please sign in to comment.