Cisco SE - Malware outbreak
| Id | 225053c7-085b-4fca-a18f-c367f9228bf3 |
| Rulename | Cisco SE - Malware outbreak |
| Description | Detects possible malware outbreak. |
| Severity | High |
| Tactics | InitialAccess |
| Techniques | T1190 T1133 |
| Required data connectors | CiscoSecureEndpoint |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco Secure Endpoint/Analytic Rules/CiscoSEMalwareOutbreak.yaml |
| Version | 1.0.0 |
| Arm template | 225053c7-085b-4fca-a18f-c367f9228bf3.json |
let threshold = 2;
CiscoSecureEndpoint
| where isnotempty(ThreatName)
| summarize infected = makeset(DstHostname) by ThreatName, bin(TimeGenerated, 10m)
| where array_length(infected) >= threshold
| extend MalwareCustomEntity = ThreatName
queryPeriod: 1h
query: |
let threshold = 2;
CiscoSecureEndpoint
| where isnotempty(ThreatName)
| summarize infected = makeset(DstHostname) by ThreatName, bin(TimeGenerated, 10m)
| where array_length(infected) >= threshold
| extend MalwareCustomEntity = ThreatName
name: Cisco SE - Malware outbreak
entityMappings:
- fieldMappings:
- columnName: MalwareCustomEntity
identifier: Name
entityType: Malware
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco Secure Endpoint/Analytic Rules/CiscoSEMalwareOutbreak.yaml
requiredDataConnectors:
- connectorId: CiscoSecureEndpoint
dataTypes:
- CiscoSecureEndpoint
description: |
'Detects possible malware outbreak.'
kind: Scheduled
version: 1.0.0
status: Available
severity: High
relevantTechniques:
- T1190
- T1133
triggerOperator: gt
triggerThreshold: 0
tactics:
- InitialAccess
id: 225053c7-085b-4fca-a18f-c367f9228bf3