Query Details
//Detects Hits from Botvrij.eu Feed in EmailUrlInfo
let BotvrijRAW = externaldata(Url: string)["https://www.botvrij.eu/data/ioclist.domain"]
| extend Url = substring(Url, 0, indexof(Url, "#"))
| where isnotempty(Url) or Url != "";
EmailUrlInfo
| where UrlDomain has_any(BotvrijRAW)
| join EmailEvents on NetworkMessageId This KQL (Kusto Query Language) query is designed to detect email activities involving URLs that are listed in a threat intelligence feed from Botvrij.eu. Here's a simplified breakdown of what the query does:
Fetch Data from Botvrij.eu:
Clean the Data:
# in the URL) and filters out any empty entries, ensuring that only valid URLs are considered.Check Email URLs Against the List:
EmailUrlInfo table, which contains information about URLs found in emails.Join with Email Events:
EmailEvents table using the NetworkMessageId to provide more context about the email events associated with these URLs.In summary, this query is used to identify and analyze email activities that involve URLs flagged as potentially harmful by Botvrij.eu, helping to detect and respond to possible security threats.

Benjamin Zulliger
Released: November 10, 2024
Tables
Keywords
Operators