Phishing
| Id | c3771865-b647-46a7-9be5-a96c418cebc0 |
| Rulename | Phishing |
| Description | New phishing with severity High found |
| Severity | High |
| Tactics | InitialAccess Discovery |
| Techniques | T1566 T1087 |
| Required data connectors | CBSPollingIDAzureFunctions |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/Phishing.yaml |
| Version | 1.0.4 |
| Arm template | c3771865-b647-46a7-9be5-a96c418cebc0.json |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Phishing" | where status_s != "Closed" or status_s != "Resolved"
queryFrequency: 5m
eventGroupingSettings:
aggregationKind: SingleAlert
id: c3771865-b647-46a7-9be5-a96c418cebc0
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/Phishing.yaml
query: |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Phishing" | where status_s != "Closed" or status_s != "Resolved"
entityMappings:
- fieldMappings:
- identifier: Url
columnName: subject_s
entityType: URL
queryPeriod: 5m
kind: Scheduled
suppressionEnabled: false
status: Available
name: Phishing
triggerThreshold: 0
relevantTechniques:
- T1566
- T1087
incidentConfiguration:
groupingConfiguration:
matchingMethod: AllEntities
lookbackDuration: PT5H
reopenClosedIncident: false
enabled: false
createIncident: true
requiredDataConnectors:
- connectorId: CBSPollingIDAzureFunctions
dataTypes:
- CBSLog_Azure_1_CL
version: 1.0.4
severity: High
description: |
'New phishing with severity High found'
tactics:
- InitialAccess
- Discovery
suppressionDuration: 5h