Contrast ADR - Exploited Attack Event
| Id | ae4f67a6-0713-4a26-ae61-284e67b408c1 |
| Rulename | Contrast ADR - Exploited Attack Event |
| Description | Detects successful exploitation of security vulnerabilities across all environments as identified by Contrast ADR. This rule captures confirmed exploited attacks that bypassed application security controls and require security team investigation. |
| Severity | High |
| Tactics | InitialAccess Execution DefenseEvasion LateralMovement CommandAndControl |
| Techniques | T1190 T1059 T1055 T1210 T1008 |
| Required data connectors | ContrastADR |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_ADR_Exploited_Attack_Event.yaml |
| Version | 1.0.0 |
| Arm template | ae4f67a6-0713-4a26-ae61-284e67b408c1.json |
ContrastADR_CL
| where result_s =~ "exploited"
relevantTechniques:
- T1190
- T1059
- T1055
- T1210
- T1008
queryPeriod: 5m
triggerOperator: gt
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.0.0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ContrastADR/Analytic Rules/Contrast_ADR_Exploited_Attack_Event.yaml
description: |
'Detects successful exploitation of security vulnerabilities across all environments as identified by Contrast ADR. This rule captures confirmed exploited attacks that bypassed application security controls and require security team investigation.'
tactics:
- InitialAccess
- Execution
- DefenseEvasion
- LateralMovement
- CommandAndControl
severity: High
status: Available
kind: Scheduled
triggerThreshold: 0
queryFrequency: 5m
alertDetailsOverride:
alertDisplayNameFormat: '{{result_s}} {{rule_s}} from {{SourceIP}} '
alertDescriptionFormat: '{{result_s}} on {{request_headers_referer_s}} endpoint of {{application_name_s}} '
requiredDataConnectors:
- dataTypes:
- ContrastADR_CL
connectorId: ContrastADR
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: Selected
enabled: true
reopenClosedIncident: false
lookbackDuration: PT1H
groupByEntities:
- IP
- Host
entityMappings:
- entityType: IP
fieldMappings:
- identifier: Address
columnName: SourceIP
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: host_hostname_s
id: ae4f67a6-0713-4a26-ae61-284e67b408c1
customDetails:
ApplicationName: application_name_s
TargetHost: host_hostname_s
AttackRule: rule_s
AttackResult: result_s
AttackedEndpoint: request_headers_referer_s
Environment: environment_s
query: |
ContrastADR_CL
| where result_s =~ "exploited"
name: Contrast ADR - Exploited Attack Event