Cyren High-Risk IP Indicators
| Id | 5d7e8b3a-1f2c-4e5d-9a0b-c1d2e3f4a5b6 |
| Rulename | Cyren High-Risk IP Indicators |
| Description | Detects high-risk IP indicators (risk score >= 80) from Cyren threat intelligence feeds in the last 24 hours. These IPs are associated with malicious activity such as malware distribution, phishing, or botnet command and control. |
| Severity | High |
| Tactics | CommandAndControl Impact |
| Techniques | T1071 T1568 |
| Required data connectors | CyrenThreatIntel |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyrenThreatIntelligence/Analytic Rules/Cyren - High Risk IP Indicators.yaml |
| Version | 1.0.0 |
| Arm template | 5d7e8b3a-1f2c-4e5d-9a0b-c1d2e3f4a5b6.json |
Cyren_Indicators_CL
| where TimeGenerated > ago(1d)
| where isnotempty(ip_s)
| extend Risk = toint(risk_d)
| where Risk >= 80
| summarize
DetectionCount = count(),
MaxRisk = max(Risk),
Categories = make_set(category_s)
by IP = ip_s, Source = source_s
| where DetectionCount >= 1
| extend
IPAddress = IP,
ThreatCategories = strcat_array(Categories, ", ")
tactics:
- CommandAndControl
- Impact
triggerOperator: gt
requiredDataConnectors:
- connectorId: CyrenThreatIntel
dataTypes:
- Cyren_Indicators_CL
relevantTechniques:
- T1071
- T1568
entityMappings:
- fieldMappings:
- identifier: Address
columnName: IPAddress
entityType: IP
suppressionDuration: 1h
id: 5d7e8b3a-1f2c-4e5d-9a0b-c1d2e3f4a5b6
queryPeriod: 1d
name: Cyren High-Risk IP Indicators
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyrenThreatIntelligence/Analytic Rules/Cyren - High Risk IP Indicators.yaml
queryFrequency: 1h
description: |
'Detects high-risk IP indicators (risk score >= 80) from Cyren threat intelligence feeds in the last 24 hours.
These IPs are associated with malicious activity such as malware distribution, phishing, or botnet command and control.'
customDetails:
DetectionCount: DetectionCount
RiskScore: MaxRisk
Categories: ThreatCategories
Source: Source
suppressionEnabled: false
version: 1.0.0
query: |
Cyren_Indicators_CL
| where TimeGenerated > ago(1d)
| where isnotempty(ip_s)
| extend Risk = toint(risk_d)
| where Risk >= 80
| summarize
DetectionCount = count(),
MaxRisk = max(Risk),
Categories = make_set(category_s)
by IP = ip_s, Source = source_s
| where DetectionCount >= 1
| extend
IPAddress = IP,
ThreatCategories = strcat_array(Categories, ", ")
incidentConfiguration:
groupingConfiguration:
lookbackDuration: 1d
matchingMethod: Selected
groupByEntities:
- IP
reopenClosedIncident: false
enabled: true
createIncident: true
triggerThreshold: 0
severity: High
status: Available
eventGroupingSettings:
aggregationKind: AlertPerResult
kind: Scheduled