Cyble Vision Alerts Github
| Id | 117e8f7c-8f44-4061-bcc2-b444b98a3838 |
| Rulename | Cyble Vision Alerts Github |
| Description | This alert generates incidents for Github |
| Severity | Low |
| Tactics | Collection CredentialAccess |
| Techniques | T1213 T1530 T1552 |
| Required data connectors | CybleVisionAlerts |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_github.yaml |
| Version | 1.0.1 |
| Arm template | 117e8f7c-8f44-4061-bcc2-b444b98a3838.json |
Alerts_github
| where Service contains "github"
| extend MappedSeverity = Severity
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: AllEntities
lookbackDuration: PT5H
reopenClosedIncident: false
enabled: false
requiredDataConnectors:
- dataTypes:
- CybleVisionAlerts_CL
connectorId: CybleVisionAlerts
relevantTechniques:
- T1213
- T1530
- T1552
triggerOperator: GreaterThan
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_github.yaml
customDetails:
GitURl: git_url
OriginalSeverity: Severity
SHA: sha
Service: Service
MappedSeverity: Severity
Repository: repo_full_name
URL: html_url
Owner: owner_login
Score: score
AlertID: AlertID
FileName: file_name
Status: Status
queryFrequency: 30m
severity: Low
subTechniques: []
triggerThreshold: 0
suppressionDuration: PT5H
entityMappings:
- fieldMappings:
- columnName: owner_login
identifier: Name
entityType: Account
- fieldMappings:
- columnName: html_url
identifier: Url
entityType: URL
- fieldMappings:
- columnName: file_name
identifier: Name
- columnName: file_path
identifier: Directory
entityType: File
alertDetailsOverride:
alertDynamicProperties: []
alertDescriptionFormat: This Rule generate incidents for Serviec Github
alertDisplayNameFormat: Cyble Vision Alert for Github
name: Cyble Vision Alerts Github
query: |
Alerts_github
| where Service contains "github"
| extend MappedSeverity = Severity
version: 1.0.1
tactics:
- Collection
- CredentialAccess
queryPeriod: 30m
description: |
'This alert generates incidents for Github'
kind: Scheduled
id: 117e8f7c-8f44-4061-bcc2-b444b98a3838
enabled: true
eventGroupingSettings:
aggregationKind: AlertPerResult
status: Available