Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Leaked Credentials

Back
Id224a63ae-e278-4a11-b7c2-02ec3e17b56c
RulenameCyble Vision Alerts Leaked Credentials
DescriptionDetects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.
SeverityLow
TacticsCredentialAccess
Discovery
Reconnaissance
TechniquesT1552
T1082
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
Version1.0.0
Arm template224a63ae-e278-4a11-b7c2-02ec3e17b56c.json
Deploy To Azure
Alerts_leaked_credentials
| where Service == "leaked_credentials"
| extend MappedSeverity = Severity
customDetails:
  Leak_Date: LC_Date
  Leak_Username: LC_Username
  Leak_Url: LC_URL
  MappedSeveritry: MappedSeverity
  Leak_Tags: LC_Tags
  MappedSeverity: Severity
  AlertID: AlertID
  Leak_Data: LC_Data
  Service: Service
  Status: Status
id: 224a63ae-e278-4a11-b7c2-02ec3e17b56c
subTechniques: []
name: Cyble Vision Alerts Leaked Credentials
queryPeriod: 30m
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
    reopenClosedIncident: false
version: 1.0.0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
query: |
  Alerts_leaked_credentials
  | where Service == "leaked_credentials"
  | extend MappedSeverity = Severity  
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1552
- T1082
suppressionDuration: PT5H
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: LC_Username
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: LC_URL
- entityType: DNS
  fieldMappings:
  - identifier: DomainName
    columnName: LC_Domain
enabled: true
severity: Low
kind: Scheduled
triggerThreshold: 0
triggerOperator: GreaterThan
tactics:
- CredentialAccess
- Discovery
- Reconnaissance
status: Available
queryFrequency: 30m
alertDetailsOverride:
  alertDisplayNameFormat: Leaked Credentials Detected {{LC_Username}}
  alertDescriptionFormat: |
        A leaked set of credentials associated with {{LC_Username}} was detected. Domain {{LC_Domain}} Source URL {{LC_URL}}
  alertDynamicProperties: []
description: |
    'Detects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.'