CYFIRMA - Brand Intelligence - ProductSolution High Rule
| Id | 3a9a81bc-2f41-4d68-9cd1-7788326c92b1 |
| Rulename | CYFIRMA - Brand Intelligence - Product/Solution High Rule |
| Description | “This alert is raised when CYFIRMA detects a critical reputation score for an IP address linked to your infrastructure. The IP has been previously associated with hacking activity and web application attacks. Denied outbound traffic to a foreign country from a known Microsoft data center IP suggests potential misuse or compromise of cloud infrastructure.” |
| Severity | High |
| Tactics | ResourceDevelopment InitialAccess |
| Techniques | T1585.002 T1583.001 T1566 T1583 |
| Required data connectors | CyfirmaBrandIntelligenceAlertsDC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BIProductSolutionHighRule.yaml |
| Version | 1.0.1 |
| Arm template | 3a9a81bc-2f41-4d68-9cd1-7788326c92b1.json |
// High severity - Product/Solution Impersonation
let timeFrame = 5m;
CyfirmaBIProductSolutionAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName='CYFIRMA',
ProductName='DeCYFIR/DeTCT'
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
triggerThreshold: 0
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: PT5H
enabled: false
eventGroupingSettings:
aggregationKind: AlertPerResult
relevantTechniques:
- T1585.002
- T1583.001
- T1566
- T1583
status: Available
alertDetailsOverride:
alertDescriptionFormat: '{{Description}} '
alertDynamicProperties:
- alertProperty: ProductName
value: ProductName
- alertProperty: ProviderName
value: ProviderName
alertDisplayNameFormat: 'CYFIRMA - Brand Impersonation Detected for Product/Solution - High Severity - {{AssetType}} : {{AssetValue}} '
requiredDataConnectors:
- dataTypes:
- CyfirmaBIProductSolutionAlerts_CL
connectorId: CyfirmaBrandIntelligenceAlertsDC
queryPeriod: 5m
query: |
// High severity - Product/Solution Impersonation
let timeFrame = 5m;
CyfirmaBIProductSolutionAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName='CYFIRMA',
ProductName='DeCYFIR/DeTCT'
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
id: 3a9a81bc-2f41-4d68-9cd1-7788326c92b1
version: 1.0.1
customDetails:
LastSeen: LastSeen
TimeGenerated: TimeGenerated
AssetType: AssetType
FirstSeen: FirstSeen
AlertUID: AlertUID
AssetValue: AssetValue
RiskScore: RiskScore
Impact: Impact
Recommendation: Recommendation
Description: Description
UID: UID
SourceSype: SourceSype
kind: Scheduled
severity: High
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BIProductSolutionHighRule.yaml
tactics:
- ResourceDevelopment
- InitialAccess
name: CYFIRMA - Brand Intelligence - Product/Solution High Rule
description: |
"This alert is raised when CYFIRMA detects a critical reputation score for an IP address linked to your infrastructure.
The IP has been previously associated with hacking activity and web application attacks.
Denied outbound traffic to a foreign country from a known Microsoft data center IP suggests potential misuse or compromise of cloud infrastructure."
queryFrequency: 5m
triggerOperator: gt