Contrast ADR - Exploited Attack Event
| Id | ae4f67a6-0713-4a26-ae61-284e67b408c1 |
| Rulename | Contrast ADR - Exploited Attack Event |
| Description | Detects successful exploitation of security vulnerabilities across all environments as identified by Contrast ADR. This rule captures confirmed exploited attacks that bypassed application security controls and require security team investigation. |
| Severity | High |
| Tactics | InitialAccess Execution DefenseEvasion LateralMovement CommandAndControl |
| Techniques | T1190 T1059 T1055 T1210 T1008 |
| Required data connectors | ContrastADRCCF |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_ADR_Exploited_Attack_Event.yaml |
| Version | 1.0.1 |
| Arm template | ae4f67a6-0713-4a26-ae61-284e67b408c1.json |
ContrastADRAttackEvents_CL
| where result =~ "exploited"
name: Contrast ADR - Exploited Attack Event
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
enabled: true
matchingMethod: Selected
groupByEntities:
- IP
- Host
lookbackDuration: PT1H
createIncident: true
query: |
ContrastADRAttackEvents_CL
| where result =~ "exploited"
entityMappings:
- entityType: IP
fieldMappings:
- columnName: sourceIp
identifier: Address
- entityType: Host
fieldMappings:
- columnName: host_hostname
identifier: HostName
queryPeriod: 5m
version: 1.0.1
tactics:
- InitialAccess
- Execution
- DefenseEvasion
- LateralMovement
- CommandAndControl
triggerOperator: gt
kind: Scheduled
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_ADR_Exploited_Attack_Event.yaml
eventGroupingSettings:
aggregationKind: AlertPerResult
alertDetailsOverride:
alertDescriptionFormat: '{{result}} on {{request_headers_referer}} endpoint of {{application_name}} '
alertDisplayNameFormat: '{{result}} {{rule}} from {{sourceIp}} '
relevantTechniques:
- T1190
- T1059
- T1055
- T1210
- T1008
id: ae4f67a6-0713-4a26-ae61-284e67b408c1
customDetails:
TargetHost: host_hostname
AttackResult: result
Environment: environment
AttackRule: rule
AttackedEndpoint: request_headers_referer
ApplicationName: application_name
severity: High
requiredDataConnectors:
- connectorId: ContrastADRCCF
dataTypes:
- ContrastADRAttackEvents_CL
status: Available
description: |
'Detects successful exploitation of security vulnerabilities across all environments as identified by Contrast ADR. This rule captures confirmed exploited attacks that bypassed application security controls and require security team investigation.'
queryFrequency: 5m