Vectra AI Detect - New Campaign Detected
| Id | a34d0338-eda0-42b5-8b93-32aae0d7a501 |
| Rulename | Vectra AI Detect - New Campaign Detected |
| Description | Identifies when a new Campaign has been detected. This occurs when multiple Detections accross different Hosts are suspected to be part of the same Attack Campaign. |
| Severity | Medium |
| Tactics | LateralMovement CommandAndControl |
| Techniques | T1021 T1071 |
| Required data connectors | CefAma |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra AI Detect/Analytic Rules/VectraDetect-NewCampaign.yaml |
| Version | 1.2.3 |
| Arm template | a34d0338-eda0-42b5-8b93-32aae0d7a501.json |
CommonSecurityLog
| where DeviceVendor == "Vectra Networks"
| where DeviceProduct == "X Series"
| where DeviceEventClassID contains "campaign"
| where DeviceAction == "START"
| extend reason = coalesce(
column_ifexists("Reason", ""),
extract("reason=(.+?)($|;)", 1, AdditionalExtensions),
""
)
| project-rename vectra_URL = DeviceCustomString4
| sort by TimeGenerated
relevantTechniques:
- T1021
- T1071
entityMappings:
- fieldMappings:
- columnName: Activity
identifier: DomainName
entityType: DNS
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: true
matchingMethod: AllEntities
enabled: true
lookbackDuration: 7d
createIncident: true
version: 1.2.3
triggerThreshold: 0
description: |
'Identifies when a new Campaign has been detected. This occurs when multiple Detections accross different Hosts are suspected to be part of the same Attack Campaign.'
customDetails:
CampaignSourceHost: SourceHostName
CampaignReason: reason
CampaignName: Activity
requiredDataConnectors:
- connectorId: CefAma
dataTypes:
- CommonSecurityLog
triggerOperator: gt
alertDetailsOverride:
alertDynamicProperties:
- alertProperty: AlertLink
value: vectra_URL
- alertProperty: ProductName
value: DeviceProduct
- alertProperty: ProviderName
value: DeviceVendor
alertDisplayNameFormat: Vectra AI - New Campaign Detected
alertDescriptionFormat: |
A new campaign named {{Activity}} has been detected (reason is {{reason}})
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Vectra AI Detect/Analytic Rules/VectraDetect-NewCampaign.yaml
id: a34d0338-eda0-42b5-8b93-32aae0d7a501
queryFrequency: 5m
query: |
CommonSecurityLog
| where DeviceVendor == "Vectra Networks"
| where DeviceProduct == "X Series"
| where DeviceEventClassID contains "campaign"
| where DeviceAction == "START"
| extend reason = coalesce(
column_ifexists("Reason", ""),
extract("reason=(.+?)($|;)", 1, AdditionalExtensions),
""
)
| project-rename vectra_URL = DeviceCustomString4
| sort by TimeGenerated
severity: Medium
status: Available
queryPeriod: 5m
name: Vectra AI Detect - New Campaign Detected
tactics:
- LateralMovement
- CommandAndControl
kind: Scheduled