M365 Copilot

Description

Logs from M365 Copilot Access Logs via Splunk Add-on for M365 and Exported Logs from eDsicovery Purview. Contains actual access logs and jailbreak attacks.

MITRE ATT&CK Techniques

No MITRE techniques specified for this dataset.

Environment Details

Field Value
Environment attack_range
Directory m365_copilot
Test Date 2025-09-25

Datasets

The following datasets were collected during this attack simulation:

M365_access_logs

  • Path: /datasets/m365_copilot/copilot_prompts.log
  • Sourcetype: csv
  • Source: csv

M365_copilot_access

  • Path: /datasets/m365_copilot/m365_copilot_access.log
  • Sourcetype: o365:graph:api
  • Source: AuditLogs.SignIns

The following detections in our security content repository use this attack data for testing:

Detection Name Type Source MITRE ATT&CK Analytic Story
M365 Copilot Impersonation Jailbreak Attack TTP Application T1562 Suspicious Microsoft 365 Copilot Activities
M365 Copilot Jailbreak Attempts Anomaly Application T1562.001 Suspicious Microsoft 365 Copilot Activities
M365 Copilot Information Extraction Jailbreak Attack TTP Application T1562 Suspicious Microsoft 365 Copilot Activities
M365 Copilot Agentic Jailbreak Attack Anomaly Application T1562 Suspicious Microsoft 365 Copilot Activities
M365 Copilot Application Usage Pattern Anomalies Anomaly Application T1078 Suspicious Microsoft 365 Copilot Activities
M365 Copilot Failed Authentication Patterns Anomaly Application T1110 Suspicious Microsoft 365 Copilot Activities
M365 Copilot Non Compliant Devices Accessing M365 Copilot Anomaly Application T1562 Suspicious Microsoft 365 Copilot Activities
M365 Copilot Session Origin Anomalies Anomaly Application T1078 Suspicious Microsoft 365 Copilot Activities

Usage Instructions

Replay with Splunk Attack Data

Replay attack data with replay.py from Splunk Attack Data.

1python replay.py --dataset /datasets/m365_copilot/copilot_prompts.log --index attack_data

Manual Import

  1. Download the dataset files from the paths listed above
  2. Configure your Splunk instance with the appropriate sourcetypes
  3. Import the logs using the Splunk Add Data wizard

Find more detections and analytics for this attack technique in our security content repository.


Source: GitHub | Version: 1.0