Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Flare source code results

Back
Id9cb7c337-f178-4af6-b0e8-b6b7552d762d
RulenameFlare source code results
DescriptionThis query searches for events found on code sharing platforms.
SeverityMedium
TacticsReconnaissance
TechniquesT1593
Required data connectorsFlare
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Flare/Analytic Rules/FlareSourceCode.yaml
Version3.0.0
Arm template9cb7c337-f178-4af6-b0e8-b6b7552d762d.json
Deploy To Azure
FireworkV2_CL
| where notempty(uid) and RiskScore >= 3
| extend index_name = split(uid, "/")[0]
| extend category_name = split(uid, "/")[1]
| where index_name == "driller" and category_name contains "github"
relevantTechniques:
- T1593
version: 3.0.0
id: 9cb7c337-f178-4af6-b0e8-b6b7552d762d
severity: Medium
kind: Scheduled
queryFrequency: 1h
description: |
    'This query searches for events found on code sharing platforms.'
requiredDataConnectors:
- connectorId: Flare
  dataTypes:
  - FireworkV2_CL
triggerOperator: gt
name: Flare source code results
tactics:
- Reconnaissance
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Flare/Analytic Rules/FlareSourceCode.yaml
triggerThreshold: 0
queryPeriod: 1h
query: |
  FireworkV2_CL
  | where notempty(uid) and RiskScore >= 3
  | extend index_name = split(uid, "/")[0]
  | extend category_name = split(uid, "/")[1]
  | where index_name == "driller" and category_name contains "github"  
status: Available