See the table of mappings for the STIX objects and operators supported by this connector.
Microsoft Graph Security API enables fedarated search capabilities on all onboarded security providers. This connector can be used to search security alerts on the Microsoft security products.
Graph Security API offers two types of alerts:
By default connector can be used to search Legacy Alerts. User can search newer version of alerts by setting {"alertV2": True}
in /azure_sentinel/configuration/config.json
Note: New Alert V2 can be used to search limited properties because $filter parameter can be used on limited properties: assignedTo, classification, determination, createdDateTime, lastUpdateDateTime, severity, serviceSource and status. See List Alert for more details
List security alerts (GET call) https://graph.microsoft.com/v1.0/security/
Ref: https://learn.microsoft.com/en-us/graph/api/resources/alert?view=graph-rest-1.0
Query Parameter:
$filter (OData V4.0 support)
Note: The Microsoft Graph Security API provides a unified interface and schema to integrate with security solutions from Microsoft and ecosystem partners. The security alerts from various partners are available and the schema comprises information about the fileStates, processes, networkConnections and userStates.
Schema Ref: https://docs.microsoft.com/en-us/graph/api/alert-get?view=graph-rest-beta&tabs=http#example
python main.py <translator_module>
<query or result>
<STIX identity object>
<data>
STIX to sentinel field mapping is defined in from_stix_map.json
This example input pattern:
translate azure_sentinel query ‘{}’ "[process:name = 'svchost.exe'] START t'2019-01-01T08:43:10Z' STOP t'2019-12-31T08:43:10Z'"
Returns the following Odata(native) query:
{'queries': ["(processes/any(query1:tolower(query1/name) eq 'svchost.exe')) and (eventDateTime ge 2019-01-01T08:43:10Z and eventDateTime le 2019-12-31T08:43:10Z)"]}
Sentinel data to STIX mapping is defined in to_stix_map.json
Sample data:
translate azure_sentinel results "{\"type\":\"identity\",\"id\":\"identity--f431f809-377b-45e0-aa1c-6a4751cae5ff\",\"name\":\"azure_sentinel\",\"identity_class\":\"events\"}" "[{\"id\": \"2518255519019388960_5cc61270-5bd7-42df-b048-2a5eee65357f\", \"azureTenantId\": \"b73e5ba8-34d5-495a-9901-06bdb84cf13e\", \"azureSubscriptionId\": \"083de1fb-cd2d-4b7c-895a-2b5af1d091e8\", \"tags\": [], \"category\": \"SuspiciousSVCHost\", \"comments\": [], \"createdDateTime\": \"2019-12-19T09:48:40.7807272Z\", \"description\": \"The system process SVCHOST was observed running in an abnormal context. Malware often use SVCHOST to masquerade its malicious activity.\", \"detectionIds\": [], \"eventDateTime\": \"2019-12-19T09:48:18.0611039Z\", \"lastModifiedDateTime\": \"2019-12-19T09:48:42.2043247Z\", \"recommendedActions_0\": \"1. Run Process Explorer and try to identify unknown running processes (see https://technet.microsoft.com/en-us/sysinternals/bb896653.aspx)\", \"recommendedActions_1\": \"2. Make sure the machine is completely updated and has an updated anti-malware application installed\", \"recommendedActions_2\": \"3. Run a full anti-malware scan and verify that the threat was removed\", \"recommendedActions_3\": \"4. Install and run Microsoft’s Malicious Software Removal Tool (see https://www.microsoft.com/en-us/download/malicious-software-removal-tool-details.aspx)\", \"recommendedActions_4\": \"5. Run Microsoft’s Autoruns utility and try to identify unknown applications that are configured to run at login (see https://technet.microsoft.com/en-us/sysinternals/bb963902.aspx)\", \"severity\": \"high\", \"sourceMaterials_0\": \"https://portal.azure.com/#blade/Microsoft_Azure_Security/AlertBlade/alertId/2518255519019388960_5cc61270-5bd7-42df-b048-2a5eee65357f/subscriptionId/083de1fb-cd2d-4b7c-895a-2b5af1d091e8/resourceGroup/eastUS/referencedFrom/alertDeepLink/location/centralus\", \"status\": \"newAlert\", \"title\": \"Suspicious SVCHOST process executed\", \"vendorInformation_provider\": \"ASC\", \"vendorInformation_subProvider\": \"Detection\", \"vendorInformation_vendor\": \"Microsoft\", \"cloudAppStates\": [], \"hostStates_0_netBiosName\": \"WINSRV-TARGET\", \"hostStates_0_os\": \"Windows\", \"historyStates\": [], \"malwareStates\": [], \"networkConnections\": [], \"processes_0_commandLine\": \"\", \"processes_1_accountName\": \"testadmin\", \"processes_1_commandLine\": \"c:\\job\\svchost.exe\", \"processes_1_createdDateTime\": \"2019-12-19T09:48:18.0611039Z\", \"processes_1_name\": \"svchost.exe\", \"processes_1_path\": \"c:\\job\\svchost.exe\", \"registryKeyStates\": [], \"triggers\": [], \"userStates_0_accountName\": \"testadmin\", \"userStates_0_domainName\": \"winsrv-target\", \"userStates_0_emailRole\": \"unknown\", \"userStates_0_logonId\": \"0x8869d3\", \"userStates_0_onPremisesSecurityIdentifier\": \"S-1-5-21-1892577120-2195645935-2669380810-500\", \"userStates_0_userPrincipalName\": \"testadmin@WINSRV-TARGET\", \"vulnerabilityStates\": [], \"event_count\": \"1\"}, {\"id\": \"2518258113113268043_0f54bc18-961c-48b7-8900-051e40dc8d22\", \"azureTenantId\": \"b73e5ba8-34d5-495a-9901-06bdb84cf13e\", \"azureSubscriptionId\": \"083de1fb-cd2d-4b7c-895a-2b5af1d091e8\", \"tags\": [], \"category\": \"SuspiciousSVCHOSTRareGroup\", \"comments\": [], \"createdDateTime\": \"2019-12-16T09:44:58.7936988Z\", \"description\": \"The system process SVCHOST was observed running a rare service group. Malware often use SVCHOST to masquerade its malicious activity.\", \"detectionIds\": [], \"eventDateTime\": \"2019-12-16T09:44:48.6731956Z\", \"lastModifiedDateTime\": \"2019-12-16T09:45:00.5345972Z\", \"recommendedActions_0\": \"1. Run Process Explorer and try to identify unknown running processes (see https://technet.microsoft.com/en-us/sysinternals/bb896653.aspx)\", \"recommendedActions_1\": \"2. Make sure the machine is completely updated and has an updated anti-malware application installed\", \"recommendedActions_2\": \"3. Run a full anti-malware scan and verify that the threat was removed\", \"recommendedActions_3\": \"4. Install and run Microsoft’s Malicious Software Removal Tool (see https://www.microsoft.com/en-us/download/malicious-software-removal-tool-details.aspx)\", \"recommendedActions_4\": \"5. Run Microsoft’s Autoruns utility and try to identify unknown applications that are configured to run at login (see https://technet.microsoft.com/en-us/sysinternals/bb963902.aspx)\", \"severity\": \"informational\", \"sourceMaterials\": [], \"status\": \"newAlert\", \"title\": \"Rare SVCHOST service group executed\", \"vendorInformation_provider\": \"ASC\", \"vendorInformation_subProvider\": \"Detection\", \"vendorInformation_vendor\": \"Microsoft\", \"cloudAppStates\": [], \"hostStates_0_netBiosName\": \"TEST-WINDOW-UPD\", \"hostStates_0_os\": \"Windows\", \"historyStates\": [], \"malwareStates\": [], \"networkConnections\": [], \"processes_0_commandLine\": \"\", \"processes_0_name\": \"services.exe\", \"processes_0_path\": \"c:\\windows\\system32\\services.exe\", \"processes_1_accountName\": \"TEST-WINDOW-UPD$\", \"processes_1_commandLine\": \"c:\\windows\\system32\\svchost.exe -k clipboardsvcgroup -p -s cbdhsvc\", \"processes_1_createdDateTime\": \"2019-12-16T09:44:48.6731956Z\", \"processes_1_name\": \"svchost.exe\", \"processes_1_parentProcessName\": \"services.exe\", \"processes_1_path\": \"c:\\windows\\system32\\svchost.exe\", \"registryKeyStates\": [], \"triggers\": [], \"userStates_0_accountName\": \"TEST-WINDOW-UPD$\", \"userStates_0_domainName\": \"WORKGROUP\", \"userStates_0_emailRole\": \"unknown\", \"userStates_0_logonId\": \"0x3e7\", \"userStates_0_onPremisesSecurityIdentifier\": \"S-1-5-18\", \"userStates_0_userPrincipalName\": \"TEST-WINDOW-UPD$@TEST-WINDOW-UPD\", \"vulnerabilityStates\": [], \"event_count\": \"1\"}, {\"id\": \"2518268485253060642_52b1a353-2fd8-4c45-8f8a-94db98dca29d\", \"azureTenantId\": \"b73e5ba8-34d5-495a-9901-06bdb84cf13e\", \"azureSubscriptionId\": \"083de1fb-cd2d-4b7c-895a-2b5af1d091e8\", \"tags\": [], \"category\": \"SuspiciousSVCHOSTRareGroup\", \"comments\": [], \"createdDateTime\": \"2019-12-04T09:38:05.2024952Z\", \"description\": \"The system process SVCHOST was observed running a rare service group. Malware often use SVCHOST to masquerade its malicious activity.\", \"detectionIds\": [], \"eventDateTime\": \"2019-12-04T09:37:54.6939357Z\", \"lastModifiedDateTime\": \"2019-12-04T09:38:06.7571701Z\", \"recommendedActions_0\": \"1. Run Process Explorer and try to identify unknown running processes (see https://technet.microsoft.com/en-us/sysinternals/bb896653.aspx)\", \"recommendedActions_1\": \"2. Make sure the machine is completely updated and has an updated anti-malware application installed\", \"recommendedActions_2\": \"3. Run a full anti-malware scan and verify that the threat was removed\", \"recommendedActions_3\": \"4. Install and run Microsoft’s Malicious Software Removal Tool (see https://www.microsoft.com/en-us/download/malicious-software-removal-tool-details.aspx)\", \"recommendedActions_4\": \"5. Run Microsoft’s Autoruns utility and try to identify unknown applications that are configured to run at login (see https://technet.microsoft.com/en-us/sysinternals/bb963902.aspx)\", \"severity\": \"informational\", \"sourceMaterials\": [], \"status\": \"newAlert\", \"title\": \"Rare SVCHOST service group executed\", \"vendorInformation_provider\": \"ASC\", \"vendorInformation_subProvider\": \"Detection\", \"vendorInformation_vendor\": \"Microsoft\", \"cloudAppStates\": [], \"hostStates_0_netBiosName\": \"TEST-WINDOW\", \"hostStates_0_os\": \"Windows\", \"historyStates\": [], \"malwareStates\": [], \"networkConnections\": [], \"processes_0_commandLine\": \"\", \"processes_0_name\": \"services.exe\", \"processes_0_path\": \"c:\\windows\\system32\\services.exe\", \"processes_1_accountName\": \"test-window$\", \"processes_1_commandLine\": \"c:\\windows\\system32\\svchost.exe -k clipboardsvcgroup -p -s cbdhsvc\", \"processes_1_createdDateTime\": \"2019-12-04T09:37:54.6939357Z\", \"processes_1_name\": \"svchost.exe\", \"processes_1_parentProcessName\": \"services.exe\", \"processes_1_path\": \"c:\\windows\\system32\\svchost.exe\", \"registryKeyStates\": [], \"triggers\": [], \"userStates_0_accountName\": \"test-window$\", \"userStates_0_domainName\": \"WORKGROUP\", \"userStates_0_emailRole\": \"unknown\", \"userStates_0_logonId\": \"0x3e7\", \"userStates_0_onPremisesSecurityIdentifier\": \"S-1-5-18\", \"userStates_0_userPrincipalName\": \"test-window$@TEST-WINDOW\", \"vulnerabilityStates\": [], \"event_count\": \"1\"}]"
Will return the following STIX observable:
{
"type": "bundle",
"id": "bundle--0474ebda-5e6e-4cc4-abd9-13195db0bd3a",
"objects": [
{
"type": "identity",
"id": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
"name": "azure_sentinel",
"identity_class": "events"
},
{
"id": "observed-data--b4e4b265-7ea6-4e74-b4ef-e62f8f0f99e4",
"type": "observed-data",
"created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
"created": "2020-01-03T10:02:44.388Z",
"modified": "2020-01-03T10:02:44.388Z",
"objects": {
"0": {
"type": "file",
"name": "svchost.exe",
"parent_directory_ref": "2"
},
"1": {
"type": "process",
"name": "svchost.exe",
"binary_ref": "0"
},
"2": {
"type": "directory",
"path": "c:\\job"
},
"3": {
"type": "user-account",
"user_id": "testadmin"
}
},
"x_msazure_sentinel_alert": {
"id": "2518255519019388960_5cc61270-5bd7-42df-b048-2a5eee65357f",
"title": "Suspicious SVCHOST process executed",
"provider": "ASC",
"vendor": "Microsoft"
},
"x_msazure_sentinel": {
"tenant_id": "b73e5ba8-34d5-495a-9901-06bdb84cf13e",
"subscription_id": "083de1fb-cd2d-4b7c-895a-2b5af1d091e8"
},
"first_observed": "2019-12-19T09:48:18.0611039Z",
"last_observed": "2019-12-19T09:48:18.0611039Z",
"number_observed": 1
},
{
"id": "observed-data--7f275bee-96f8-4074-af75-d116506bd4d9",
"type": "observed-data",
"created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
"created": "2020-01-03T10:02:44.390Z",
"modified": "2020-01-03T10:02:44.390Z",
"objects": {
"0": {
"type": "file",
"name": "services.exe",
"parent_directory_ref": "2"
},
"1": {
"type": "process",
"name": "services.exe",
"binary_ref": "0"
},
"2": {
"type": "directory",
"path": "c:\\windows\\system32"
},
"3": {
"type": "file",
"name": "svchost.exe",
"parent_directory_ref": "5"
},
"4": {
"type": "process",
"name": "svchost.exe",
"parent_ref": "1",
"binary_ref": "3"
},
"5": {
"type": "directory",
"path": "c:\\windows\\system32"
},
"6": {
"type": "user-account",
"user_id": "TEST-WINDOW-UPD$"
}
},
"x_msazure_sentinel_alert": {
"id": "2518258113113268043_0f54bc18-961c-48b7-8900-051e40dc8d22",
"title": "Rare SVCHOST service group executed",
"provider": "ASC",
"vendor": "Microsoft"
},
"x_msazure_sentinel": {
"tenant_id": "b73e5ba8-34d5-495a-9901-06bdb84cf13e",
"subscription_id": "083de1fb-cd2d-4b7c-895a-2b5af1d091e8"
},
"first_observed": "2019-12-16T09:44:48.6731956Z",
"last_observed": "2019-12-16T09:44:48.6731956Z",
"number_observed": 1
},
{
"id": "observed-data--fed4287e-60b8-413e-aa0a-a511ed860f78",
"type": "observed-data",
"created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
"created": "2020-01-03T10:02:44.394Z",
"modified": "2020-01-03T10:02:44.394Z",
"objects": {
"0": {
"type": "file",
"name": "services.exe",
"parent_directory_ref": "2"
},
"1": {
"type": "process",
"name": "services.exe",
"binary_ref": "0"
},
"2": {
"type": "directory",
"path": "c:\\windows\\system32"
},
"3": {
"type": "file",
"name": "svchost.exe",
"parent_directory_ref": "5"
},
"4": {
"type": "process",
"name": "svchost.exe",
"parent_ref": "1",
"binary_ref": "3"
},
"5": {
"type": "directory",
"path": "c:\\windows\\system32"
},
"6": {
"type": "user-account",
"user_id": "test-window$"
}
},
"x_msazure_sentinel_alert": {
"id": "2518268485253060642_52b1a353-2fd8-4c45-8f8a-94db98dca29d",
"title": "Rare SVCHOST service group executed",
"provider": "ASC",
"vendor": "Microsoft"
},
"x_msazure_sentinel": {
"tenant_id": "b73e5ba8-34d5-495a-9901-06bdb84cf13e",
"subscription_id": "083de1fb-cd2d-4b7c-895a-2b5af1d091e8"
},
"first_observed": "2019-12-04T09:37:54.6939357Z",
"last_observed": "2019-12-04T09:37:54.6939357Z",
"number_observed": 1
}
]
}
STIX to sentinel field mapping is defined in from_stix_map.json
This example input pattern:
translate azure_sentinel query '{} "[x_msazure_sentinel_alert:provider = 'ASC'] START t'2019-01-01T08:43:10Z' STOP t'2019-12-31T08:43:10Z'"
Returns the following Odata(native) query:
{'queries': ["(vendorInformation/provider eq 'ASC') and (eventDateTime ge 2019-01-01T08:43:10Z and eventDateTime le 2019-12-31T08:43:10Z)"]}
Sentinel data to STIX mapping is defined in to_stix_map.json
Sample data:
translate azure_sentinel results "{\"type\":\"identity\",\"id\":\"identity--f431f809-377b-45e0-aa1c-6a4751cae5ff\",\"name\":\"azure_sentinel\",\"identity_class\":\"events\"}" "[{\"id\": \"2518254730385772806_da637123660281149084_-953649836:4wVg68RS3EYNc3Qb7xJUNrYw9KEUBA1wZ3IVwRA0hmg=:WS44c473f9-e9bf-4c71-b40f-3cfd549c34df\", \"azureTenantId\": \"b73e5ba8-34d5-495a-9901-06bdb84cf13e\", \"azureSubscriptionId\": \"083de1fb-cd2d-4b7c-895a-2b5af1d091e8\", \"tags\": [], \"category\": \"Suspected credential theft activity\", \"comments\": [], \"createdDateTime\": \"2019-12-20T07:45:03.1726913Z\", \"description\": \"This program exhibits suspect characteristics potentially associated with credential theft. Once obtained, these credentials are often used in lateral movement activities to infiltrate other machines and servers in the network.\", \"detectionIds\": [], \"eventDateTime\": \"2019-12-20T07:42:41.4227193Z\", \"lastModifiedDateTime\": \"2019-12-20T07:45:06.1246819Z\", \"recommendedActions_0\": \"1. Make sure the machine is completely updated and all your software has the latest patch.\", \"recommendedActions_1\": \"2. Contact your incident response team. NOTE: If you don’t have an incident response team, contact Microsoft Support for architectural remediation and forensic.\", \"recommendedActions_2\": \"3. Install and run Microsoft’s Malicious Software Removal Tool (see https://www.microsoft.com/en-us/download/malicious-software-removal-tool-details.aspx).\", \"recommendedActions_3\": \"4. Run Microsoft’s Autoruns utility and try to identify unknown applications that are configured to run at login (see https://technet.microsoft.com/en-us/sysinternals/bb963902.aspx).\", \"recommendedActions_4\": \"5. Run Process Explorer and try to identify unknown running processes (see https://technet.microsoft.com/en-us/sysinternals/bb896653.aspx).\", \"severity\": \"medium\", \"sourceMaterials_0\": \"https://portal.azure.com/#blade/Microsoft_Azure_Security/AlertBlade/alertId/2518254730385772806_da637123660281149084_-953649836:4wVg68RS3EYNc3Qb7xJUNrYw9KEUBA1wZ3IVwRA0hmg=:WS44c473f9-e9bf-4c71-b40f-3cfd549c34df/subscriptionId/083de1fb-cd2d-4b7c-895a-2b5af1d091e8/resourceGroup/eastUS/referencedFrom/alertDeepLink/location/westeurope\", \"sourceMaterials_1\": \"https://securitycenter.windows.com/alert/da637123660281149084_-953649836\", \"status\": \"newAlert\", \"title\": \"Suspected credential theft activity\", \"vendorInformation_provider\": \"ASC\", \"vendorInformation_subProvider\": \"MDATP\", \"vendorInformation_vendor\": \"Microsoft\", \"cloudAppStates\": [], \"fileStates_0_name\": \"cmd.exe\", \"fileStates_0_path\": \"C:\\Windows\\System32\\cmd.exe\", \"fileStates_0_fileHash_hashType\": \"sha256\", \"fileStates_0_fileHash_hashValue\": \"6f88fb88ffb0f1d5465c2826e5b4f523598b1b8378377c8378ffebc171bad18b\", \"fileStates_0_sha256\": \"6f88fb88ffb0f1d5465c2826e5b4f523598b1b8378377c8378ffebc171bad18b\", \"hostStates_0_netBiosName\": \"winsrv-target\", \"historyStates\": [], \"malwareStates\": [], \"networkConnections\": [], \"processes\": [], \"registryKeyStates\": [], \"triggers\": [], \"userStates_0_accountName\": \"testadmin\", \"userStates_0_domainName\": \"winsrv-target\", \"userStates_0_emailRole\": \"unknown\", \"userStates_0_userPrincipalName\": \"testadmin@winsrv-target\", \"vulnerabilityStates\": [], \"event_count\": \"1\"}, {\"id\": \"2518254730385772806_da637123660281149084_-953649836:JGqJp4SlSroeE_6c3bZL6R6oWUal2lFJRO3d6N8jgyk=:WS44c473f9-e9bf-4c71-b40f-3cfd549c34df\", \"azureTenantId\": \"b73e5ba8-34d5-495a-9901-06bdb84cf13e\", \"azureSubscriptionId\": \"083de1fb-cd2d-4b7c-895a-2b5af1d091e8\", \"tags\": [], \"category\": \"Suspected credential theft activity\", \"comments\": [], \"createdDateTime\": \"2019-12-20T07:45:03.5008384Z\", \"description\": \"This program exhibits suspect characteristics potentially associated with credential theft. Once obtained, these credentials are often used in lateral movement activities to infiltrate other machines and servers in the network.\", \"detectionIds\": [], \"eventDateTime\": \"2019-12-20T07:42:41.4227193Z\", \"lastModifiedDateTime\": \"2019-12-20T07:45:06.0810972Z\", \"recommendedActions_0\": \"1. Make sure the machine is completely updated and all your software has the latest patch.\", \"recommendedActions_1\": \"2. Contact your incident response team. NOTE: If you don’t have an incident response team, contact Microsoft Support for architectural remediation and forensic.\", \"recommendedActions_2\": \"3. Install and run Microsoft’s Malicious Software Removal Tool (see https://www.microsoft.com/en-us/download/malicious-software-removal-tool-details.aspx).\", \"recommendedActions_3\": \"4. Run Microsoft’s Autoruns utility and try to identify unknown applications that are configured to run at login (see https://technet.microsoft.com/en-us/sysinternals/bb963902.aspx).\", \"recommendedActions_4\": \"5. Run Process Explorer and try to identify unknown running processes (see https://technet.microsoft.com/en-us/sysinternals/bb896653.aspx).\", \"severity\": \"medium\", \"sourceMaterials_0\": \"https://portal.azure.com/#blade/Microsoft_Azure_Security/AlertBlade/alertId/2518254730385772806_da637123660281149084_-953649836:JGqJp4SlSroeE_6c3bZL6R6oWUal2lFJRO3d6N8jgyk=:WS44c473f9-e9bf-4c71-b40f-3cfd549c34df/subscriptionId/083de1fb-cd2d-4b7c-895a-2b5af1d091e8/resourceGroup/eastUS/referencedFrom/alertDeepLink/location/westeurope\", \"sourceMaterials_1\": \"https://securitycenter.windows.com/alert/da637123660281149084_-953649836\", \"status\": \"newAlert\", \"title\": \"Suspected credential theft activity\", \"vendorInformation_provider\": \"ASC\", \"vendorInformation_subProvider\": \"MDATP\", \"vendorInformation_vendor\": \"Microsoft\", \"cloudAppStates\": [], \"fileStates_0_name\": \"mimikatz.exe\", \"fileStates_0_path\": \"C:\\tools\\mimikatz-master\\lib\\x64\\mimikatz.exe\", \"fileStates_0_fileHash_hashType\": \"sha256\", \"fileStates_0_fileHash_hashValue\": \"bf1a1daac21d3807924d0d3d13282bc020a6e1d9c634963667ec5e746c409bde\", \"fileStates_0_sha256\": \"bf1a1daac21d3807924d0d3d13282bc020a6e1d9c634963667ec5e746c409bde\", \"hostStates_0_netBiosName\": \"winsrv-target\", \"historyStates\": [], \"malwareStates\": [], \"networkConnections\": [], \"processes\": [], \"registryKeyStates\": [], \"triggers\": [], \"userStates_0_accountName\": \"testadmin\", \"userStates_0_domainName\": \"winsrv-target\", \"userStates_0_emailRole\": \"unknown\", \"userStates_0_userPrincipalName\": \"testadmin@winsrv-target\", \"vulnerabilityStates\": [], \"event_count\": \"1\"}]"
Will return the following STIX observable:
{
"type": "bundle",
"id": "bundle--ca7550fb-7417-4754-8462-b968174597b4",
"objects": [
{
"type": "identity",
"id": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
"name": "azure_sentinel",
"identity_class": "events"
},
{
"id": "observed-data--50d19bda-0e87-4ac1-a134-718994512c29",
"type": "observed-data",
"created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
"created": "2020-01-03T12:57:29.700Z",
"modified": "2020-01-03T12:57:29.700Z",
"objects": {
"0": {
"type": "file",
"name": "cmd.exe",
"parent_directory_ref": "1",
"hashes": {
"SHA-256": "6f88fb88ffb0f1d5465c2826e5b4f523598b1b8378377c8378ffebc171bad18b"
}
},
"1": {
"type": "directory",
"path": "C:\\Windows\\System32"
},
"2": {
"type": "domain-name",
"value": "winsrv-target"
},
"3": {
"type": "user-account",
"user_id": "testadmin"
}
},
"x_msazure_sentinel_alert": {
"id": "2518254730385772806_da637123660281149084_-953649836:4wVg68RS3EYNc3Qb7xJUNrYw9KEUBA1wZ3IVwRA0hmg=:WS44c473f9-e9bf-4c71-b40f-3cfd549c34df",
"title": "Suspected credential theft activity",
"provider": "ASC",
"vendor": "Microsoft"
},
"x_msazure_sentinel": {
"tenant_id": "b73e5ba8-34d5-495a-9901-06bdb84cf13e",
"subscription_id": "083de1fb-cd2d-4b7c-895a-2b5af1d091e8"
},
"first_observed": "2019-12-20T07:42:41.4227193Z",
"last_observed": "2019-12-20T07:42:41.4227193Z",
"number_observed": 1
},
{
"id": "observed-data--a0f2cce6-f664-461c-bd7d-dd857c0b34f2",
"type": "observed-data",
"created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
"created": "2020-01-03T12:57:29.702Z",
"modified": "2020-01-03T12:57:29.702Z",
"objects": {
"0": {
"type": "file",
"name": "mimikatz.exe",
"parent_directory_ref": "1",
"hashes": {
"SHA-256": "bf1a1daac21d3807924d0d3d13282bc020a6e1d9c634963667ec5e746c409bde"
}
},
"1": {
"type": "directory",
"path": "C:\\tools\\mimikatz-master\\lib\\x64"
},
"2": {
"type": "domain-name",
"value": "winsrv-target"
},
"3": {
"type": "user-account",
"user_id": "testadmin"
}
},
"x_msazure_sentinel_alert": {
"id": "2518254730385772806_da637123660281149084_-953649836:JGqJp4SlSroeE_6c3bZL6R6oWUal2lFJRO3d6N8jgyk=:WS44c473f9-e9bf-4c71-b40f-3cfd549c34df",
"title": "Suspected credential theft activity",
"provider": "ASC",
"vendor": "Microsoft"
},
"x_msazure_sentinel": {
"tenant_id": "b73e5ba8-34d5-495a-9901-06bdb84cf13e",
"subscription_id": "083de1fb-cd2d-4b7c-895a-2b5af1d091e8"
},
"first_observed": "2019-12-20T07:42:41.4227193Z",
"last_observed": "2019-12-20T07:42:41.4227193Z",
"number_observed": 1
}
]
}
Translated STIX attributes are inserted into the OData query in the order they are defined in the mapping file.
STIX Operator | Sample STIX expr | Sentinel Operator | Sample Native Expr |
---|---|---|---|
AND | [process:name = 'services.exe’] AND [network-traffic:dst_ref.value = '52.94.233.129'] | and | Both the observation expressions are handled as a single query joined with and operator. |
OR | [process:name = 'services.exe’] OR [network-traffic:dst_ref.value = '52.94.233.129'] | or | Both the observation expressions are handled as a single query joined with or operator. |
= | [network-traffic:dst_port=22] | eq | networkConnections/any(q1:q1/destinationPort eq ‘22') |
!= | [network-traffic:dst_port!=22] | ne | networkConnections/any(q1:q1/destinationPort ne ‘22') |
'<' | [network-traffic:dst_port<22] | lt | networkConnections/any(q1:q1/destinationPort lt ‘22') |
'>' | [network-traffic:dst_port>22] | gt | networkConnections/any(q1:q1/destinationPort gt ‘22') |
'<=' | [network-traffic:dst_port<=22] | le | networkConnections/any(q1:q1/destinationPort le ‘22') |
'>=' | [network-traffic:dst_port>=22] | ge | networkConnections/any(q1:q1/destinationPort ge ‘22') |
IN | [network-traffic:dst_port IN (22, 3389)] | eq(equals) with multiple (or) operator | networkConnections/any(a1:a1/destinationPort eq '22') or networkConnections/any(a1:a1/destinationPort eq '3389') |
NOT IN | [network-traffic:dst_port NOT IN (22, 3389)] | ne(not equals) with multiple (and) operator | networkConnections/any(a1:a1/destinationPort ne '22’) and networkConnections/any(a1:a1/destinationPort ne '3389' |
LIKE, _: any one character, % - zero or more characters | process:name LIKE ‘%exe' | contains | processes/any(n:contains(n/name, 'exe')) |
Matches | File:name MATCHES ‘.exe’ | contains | processes/any(n:contains(n/name, 'exe')) |
NOT | network-traffic:dst_port NOT > 22 | Reversal of trailing operator behavior. | networkConnections/any(a1:a1/destinationPort le ‘22') |
ISSUBSET, ISSUPERSET | - | Not Supported | - |
STIX attributes that map to multiple sentinel fields will have those fields joined by ORs in the returned query with comparator operator as 'equals' (custom logic) .
STIX attributes that map to multiple sentinel fields will have those fields joined by ANDs in the returned query with comparator operator as 'not equals' (custom logic).
STIX attributes that map to multiple sentinel fields will have those fields with comparator operator reversed. This reversal is effected for all the combinations (custom logic)
Sentinel does not support operator support for the following attributes,
IN/NOT-IN Operator
- x_msazure_sentinel_alert:provider
- x_msazure_sentinel_alert:vendor
LIKE Operator
- process:pid
- process:parent_ref.pid
- user-account:account_last_login