Cyren High-Risk URL Indicators
| Id | 6e8f9c4b-2a3b-5c6d-0e1f-d2e3f4a5b6c7 |
| Rulename | Cyren High-Risk URL Indicators |
| Description | Detects high-risk URL indicators (risk score >= 80) from Cyren malware URL threat intelligence feeds in the last 24 hours. These URLs are associated with malware distribution, phishing campaigns, or other malicious content hosting. |
| Severity | High |
| Tactics | InitialAccess Execution |
| Techniques | T1566 T1189 |
| Required data connectors | CyrenThreatIntel |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyrenThreatIntelligence/Analytic Rules/Cyren - High Risk URL Indicators.yaml |
| Version | 1.0.0 |
| Arm template | 6e8f9c4b-2a3b-5c6d-0e1f-d2e3f4a5b6c7.json |
Cyren_Indicators_CL
| where TimeGenerated > ago(1d)
| where isnotempty(url_s)
| extend Risk = toint(risk_d)
| where Risk >= 80
| summarize
DetectionCount = count(),
MaxRisk = max(Risk),
Categories = make_set(category_s)
by URL = url_s, Domain = domain_s, Source = source_s
| where DetectionCount >= 1
| extend
MaliciousURL = URL,
ThreatCategories = strcat_array(Categories, ", ")
query: |
Cyren_Indicators_CL
| where TimeGenerated > ago(1d)
| where isnotempty(url_s)
| extend Risk = toint(risk_d)
| where Risk >= 80
| summarize
DetectionCount = count(),
MaxRisk = max(Risk),
Categories = make_set(category_s)
by URL = url_s, Domain = domain_s, Source = source_s
| where DetectionCount >= 1
| extend
MaliciousURL = URL,
ThreatCategories = strcat_array(Categories, ", ")
entityMappings:
- fieldMappings:
- identifier: Url
columnName: MaliciousURL
entityType: URL
triggerOperator: gt
incidentConfiguration:
groupingConfiguration:
groupByEntities:
- URL
lookbackDuration: 1d
reopenClosedIncident: false
matchingMethod: Selected
enabled: true
createIncident: true
description: |
'Detects high-risk URL indicators (risk score >= 80) from Cyren malware URL threat intelligence feeds in the last 24 hours.
These URLs are associated with malware distribution, phishing campaigns, or other malicious content hosting.'
suppressionDuration: 1h
tactics:
- InitialAccess
- Execution
severity: High
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyrenThreatIntelligence/Analytic Rules/Cyren - High Risk URL Indicators.yaml
kind: Scheduled
name: Cyren High-Risk URL Indicators
eventGroupingSettings:
aggregationKind: AlertPerResult
triggerThreshold: 0
status: Available
suppressionEnabled: false
id: 6e8f9c4b-2a3b-5c6d-0e1f-d2e3f4a5b6c7
requiredDataConnectors:
- connectorId: CyrenThreatIntel
dataTypes:
- Cyren_Indicators_CL
relevantTechniques:
- T1566
- T1189
version: 1.0.0
customDetails:
RiskScore: MaxRisk
Domain: Domain
DetectionCount: DetectionCount
Categories: ThreatCategories
Source: Source
queryPeriod: 1d