CYFIRMA - High severity Malicious Network Indicators with Monitor Action Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This rule detects high-confidence network-based indicators such as IP addresses, domains, and URLs reported by CYFIRMA threat intelligence with a recommended action of 'Monitor' and no specified role. These indicators may be associated with infrastructure used in phishing campaigns, malware, or initial access via watering hole or drive-by compromise techniques.

Attribute Value
Type Analytic Rule
Solution Cyfirma Cyber Intelligence
ID 8317de44-09e4-4a04-8fae-c38c1b72064b
Severity High
Kind Scheduled
Tactics InitialAccess, Execution, Reconnaissance, Impact
Techniques T1566, T1189, T1204, T1595, T1498, T1566.002, T1204.001, T1595.002
Required Connectors CyfirmaCyberIntelligenceDC
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyfirmaIndicators_CL ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cyfirma Cyber Intelligence