Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cisco SE - Malware outbreak

Back
Id225053c7-085b-4fca-a18f-c367f9228bf3
RulenameCisco SE - Malware outbreak
DescriptionDetects possible malware outbreak.
SeverityHigh
TacticsInitialAccess
TechniquesT1190
T1133
Required data connectorsCiscoSecureEndpoint
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco Secure Endpoint/Analytic Rules/CiscoSEMalwareOutbreak.yaml
Version1.0.0
Arm template225053c7-085b-4fca-a18f-c367f9228bf3.json
Deploy To Azure
let threshold = 2;
CiscoSecureEndpoint
| where isnotempty(ThreatName)
| summarize infected = makeset(DstHostname) by ThreatName, bin(TimeGenerated, 10m)
| where array_length(infected) >= threshold
| extend MalwareCustomEntity = ThreatName
queryPeriod: 1h
query: |
  let threshold = 2;
  CiscoSecureEndpoint
  | where isnotempty(ThreatName)
  | summarize infected = makeset(DstHostname) by ThreatName, bin(TimeGenerated, 10m)
  | where array_length(infected) >= threshold
  | extend MalwareCustomEntity = ThreatName  
name: Cisco SE - Malware outbreak
entityMappings:
- fieldMappings:
  - columnName: MalwareCustomEntity
    identifier: Name
  entityType: Malware
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco Secure Endpoint/Analytic Rules/CiscoSEMalwareOutbreak.yaml
requiredDataConnectors:
- connectorId: CiscoSecureEndpoint
  dataTypes:
  - CiscoSecureEndpoint
description: |
    'Detects possible malware outbreak.'
kind: Scheduled
version: 1.0.0
status: Available
severity: High
relevantTechniques:
- T1190
- T1133
triggerOperator: gt
triggerThreshold: 0
tactics:
- InitialAccess
id: 225053c7-085b-4fca-a18f-c367f9228bf3