Suspicious Mobile App High
| Id | 6e9afac9-6828-486f-b1d8-cf76e86e1224 |
| Rulename | Suspicious Mobile App High |
| Description | New Suspicious Mobile App with severity High found |
| Severity | High |
| Tactics | ResourceDevelopment |
| Techniques | T1587 T1588.002 |
| Required data connectors | CBSPollingIDAzureFunctions |
| Kind | Scheduled |
| Query frequency | 5h |
| Query period | 5h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/SuspiciousMobileAppHigh.yaml |
| Version | 1.0.3 |
| Arm template | 6e9afac9-6828-486f-b1d8-cf76e86e1224.json |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Suspicious Mobile App" | where status_s != "Closed" or status_s != "Resolved"
queryPeriod: 5h
query: CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Suspicious Mobile App" | where status_s != "Closed" or status_s != "Resolved"
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/SuspiciousMobileAppHigh.yaml
name: Suspicious Mobile App High
entityMappings:
- fieldMappings:
- columnName: subject_s
identifier: Url
entityType: URL
eventGroupingSettings:
aggregationKind: SingleAlert
queryFrequency: 5h
suppressionEnabled: false
requiredDataConnectors:
- connectorId: CBSPollingIDAzureFunctions
dataTypes:
- CBSLog_Azure_1_CL
description: |
'New Suspicious Mobile App with severity High found'
kind: Scheduled
incidentConfiguration:
groupingConfiguration:
lookbackDuration: PT5H
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
createIncident: true
version: 1.0.3
suppressionDuration: 5h
status: Available
severity: High
relevantTechniques:
- T1587
- T1588.002
triggerOperator: gt
triggerThreshold: 0
tactics:
- ResourceDevelopment
id: 6e9afac9-6828-486f-b1d8-cf76e86e1224