Detection rules › Elastic

Suspicious Access to LDAP Attributes

Author
Elastic
Source
upstream

Identify read access to a high number of Active Directory object attributes. The knowledge of objects properties can help adversaries find vulnerabilities, elevate privileges or collect sensitive information.

MITRE ATT&CK coverage

TacticTechniques
DiscoveryT1069 Permission Groups Discovery, T1069.002 Permission Groups Discovery: Domain Groups, T1087 Account Discovery, T1087.002 Account Discovery: Domain Account, T1482 Domain Trust Discovery

Event coverage

ProviderEvent IDTitle
Security-Auditing4662An operation was performed on an object.

Stages and Predicates

Stage 1: eql:any

not winlog.event_data.SubjectUserSid:"S-1-5-18" and winlog.event_data.AccessMaskDescription:"Read Property"

Exclusions

Top-level NOT(...) conjuncts — predicates this rule actively suppresses.

StageFieldKindExcluded values
1SubjectUserSideqS-1-5-18

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
winlog.event_data.AccessMaskDescriptioneq
  • Read Property