Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Radiflow - Suspicious Malicious Activity Detected

Back
Idecac26b8-147d-478a-9d50-99be4bf14019
RulenameRadiflow - Suspicious Malicious Activity Detected
DescriptionGenerates an incident when malware is detected by Radiflow’s iSID.
SeverityHigh
TacticsDefenseEvasion
InhibitResponseFunction
TechniquesT0851
Required data connectorsRadiflowIsid
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Radiflow/Analytic Rules/RadiflowSuspiciousMaliciousActivityDetected.yaml
Version1.0.0
Arm templateecac26b8-147d-478a-9d50-99be4bf14019.json
Deploy To Azure
RadiflowEvent
| where DeviceProduct =~ 'iSID'
| where EventClassID in (57, 58, 59, 60, 176, 178, 181)
eventGroupingSettings:
  aggregationKind: AlertPerResult
triggerThreshold: 0
entityMappings:
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: SourceHostName
  - identifier: NetBiosName
    columnName: SourceHostName
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: DestinationHostName
  - identifier: NetBiosName
    columnName: DestinationHostName
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: SourceIP
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: DestinationIP
requiredDataConnectors:
- dataTypes:
  - RadiflowEvent
  connectorId: RadiflowIsid
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Radiflow/Analytic Rules/RadiflowSuspiciousMaliciousActivityDetected.yaml
customDetails:
  SourceHostName: SourceHostName
  DestinationVendor: DestinationVendor
  SourceVendor: SourceVendor
  Protocol: Protocol
  DestinationIP: DestinationIP
  SourceIP: SourceIP
  SourceVLAN: SourceVLAN
  DestinationMAC: DestinationMACAddress
  DestinationHostName: DestinationHostName
  DestinationType: DestinationType
  SourceMAC: SourceMACAddress
  Port: Port
  SourceType: SourceType
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: 1h
    reopenClosedIncident: false
    groupByCustomDetails: []
    enabled: true
    groupByAlertDetails: []
    groupByEntities: []
    matchingMethod: AllEntities
version: 1.0.0
name: Radiflow - Suspicious Malicious Activity Detected
alertDetailsOverride:
  alertDisplayNameFormat: 'Suspicious Malicious Activity Detected: {{EventMessage}}'
  alertSeverityColumnName: EventSeverity
  alertDynamicProperties: []
  alertDescriptionFormat: |-
    A possible malware has been detected in the network as specified in the details of the incident. Please verify the source of this activity.

    Message: {{EventMessage}}
    Source device: {{{SourceIP}} 
    Destination device (if any): {{DestinationIP}}    
relevantTechniques:
- T0851
status: Available
suppressionEnabled: false
queryPeriod: 1h
kind: Scheduled
id: ecac26b8-147d-478a-9d50-99be4bf14019
query: |
  RadiflowEvent
  | where DeviceProduct =~ 'iSID'
  | where EventClassID in (57, 58, 59, 60, 176, 178, 181)  
description: |
    'Generates an incident when malware is detected by Radiflow's iSID.'
queryFrequency: 1h
severity: High
triggerOperator: gt
tactics:
- DefenseEvasion
- InhibitResponseFunction
suppressionDuration: 5h