TacitRed - High Confidence Compromise
| Id | b2c3d4e5-f6a7-8901-bcde-f23456789012 |
| Rulename | TacitRed - High Confidence Compromise |
| Description | Detects compromised credentials with high confidence scores. High confidence findings indicate verified credential compromises that require immediate attention. Ref: https://data443.com/tacitred-attack-surface-intelligence/ |
| Severity | High |
| Tactics | CredentialAccess InitialAccess Reconnaissance |
| Techniques | T1078 T1589 |
| Required data connectors | TacitRedThreatIntel |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/TacitRedThreatIntelligence/Analytic Rules/TacitRed - High Confidence Compromise.yaml |
| Version | 1.0.1 |
| Arm template | b2c3d4e5-f6a7-8901-bcde-f23456789012.json |
TacitRed_Findings_CL
| where TimeGenerated >= ago(1h)
| where confidence_d >= 80
| extend
Email = tostring(email_s),
Username = tostring(username_s),
Domain = tostring(domain_s),
FindingType = tostring(findingType_s),
Confidence = todouble(confidence_d),
Source = tostring(source_s),
Severity = tostring(severity_s)
| project
TimeGenerated,
Email,
Username,
Domain,
FindingType,
Confidence,
Source,
Severity
eventGroupingSettings:
aggregationKind: AlertPerResult
triggerThreshold: 0
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: Username
- identifier: UPNSuffix
columnName: Email
- entityType: DNS
fieldMappings:
- identifier: DomainName
columnName: Domain
requiredDataConnectors:
- dataTypes:
- TacitRed_Findings_CL
connectorId: TacitRedThreatIntel
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/TacitRedThreatIntelligence/Analytic Rules/TacitRed - High Confidence Compromise.yaml
suppressionEnabled: false
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: 5h
reopenClosedIncident: false
enabled: true
groupByEntities:
- Account
matchingMethod: Selected
name: TacitRed - High Confidence Compromise
relevantTechniques:
- T1078
- T1589
query: |-
TacitRed_Findings_CL
| where TimeGenerated >= ago(1h)
| where confidence_d >= 80
| extend
Email = tostring(email_s),
Username = tostring(username_s),
Domain = tostring(domain_s),
FindingType = tostring(findingType_s),
Confidence = todouble(confidence_d),
Source = tostring(source_s),
Severity = tostring(severity_s)
| project
TimeGenerated,
Email,
Username,
Domain,
FindingType,
Confidence,
Source,
Severity
version: 1.0.1
queryPeriod: 1h
kind: Scheduled
id: b2c3d4e5-f6a7-8901-bcde-f23456789012
description: |-
Detects compromised credentials with high confidence scores.
High confidence findings indicate verified credential compromises that require immediate attention.
Ref: https://data443.com/tacitred-attack-surface-intelligence/
queryFrequency: 1h
severity: High
triggerOperator: GreaterThan
tactics:
- CredentialAccess
- InitialAccess
- Reconnaissance
suppressionDuration: 5h