Cisco SE - Malware outbreak
| Id | 225053c7-085b-4fca-a18f-c367f9228bf3 |
| Rulename | Cisco SE - Malware outbreak |
| Description | Detects possible malware outbreak. |
| Severity | High |
| Tactics | InitialAccess |
| Techniques | T1190 T1133 |
| Required data connectors | CiscoSecureEndpoint |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco Secure Endpoint/Analytic Rules/CiscoSEMalwareOutbreak.yaml |
| Version | 1.0.0 |
| Arm template | 225053c7-085b-4fca-a18f-c367f9228bf3.json |
let threshold = 2;
CiscoSecureEndpoint
| where isnotempty(ThreatName)
| summarize infected = makeset(DstHostname) by ThreatName, bin(TimeGenerated, 10m)
| where array_length(infected) >= threshold
| extend MalwareCustomEntity = ThreatName
requiredDataConnectors:
- connectorId: CiscoSecureEndpoint
dataTypes:
- CiscoSecureEndpoint
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cisco Secure Endpoint/Analytic Rules/CiscoSEMalwareOutbreak.yaml
triggerThreshold: 0
status: Available
relevantTechniques:
- T1190
- T1133
queryPeriod: 1h
name: Cisco SE - Malware outbreak
entityMappings:
- entityType: Malware
fieldMappings:
- columnName: MalwareCustomEntity
identifier: Name
queryFrequency: 1h
triggerOperator: gt
kind: Scheduled
description: |
'Detects possible malware outbreak.'
tactics:
- InitialAccess
severity: High
version: 1.0.0
query: |
let threshold = 2;
CiscoSecureEndpoint
| where isnotempty(ThreatName)
| summarize infected = makeset(DstHostname) by ThreatName, bin(TimeGenerated, 10m)
| where array_length(infected) >= threshold
| extend MalwareCustomEntity = ThreatName
id: 225053c7-085b-4fca-a18f-c367f9228bf3