Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Leaked Credentials

Back
Id224a63ae-e278-4a11-b7c2-02ec3e17b56c
RulenameCyble Vision Alerts Leaked Credentials
DescriptionDetects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.
SeverityLow
TacticsCredentialAccess
Discovery
Reconnaissance
TechniquesT1552
T1082
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
Version1.0.0
Arm template224a63ae-e278-4a11-b7c2-02ec3e17b56c.json
Deploy To Azure
Alerts_leaked_credentials
| where Service == "leaked_credentials"
| extend MappedSeverity = Severity
status: Available
enabled: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
version: 1.0.0
suppressionDuration: PT5H
queryPeriod: 30m
subTechniques: []
query: |
  Alerts_leaked_credentials
  | where Service == "leaked_credentials"
  | extend MappedSeverity = Severity  
kind: Scheduled
name: Cyble Vision Alerts Leaked Credentials
triggerOperator: GreaterThan
severity: Low
eventGroupingSettings:
  aggregationKind: AlertPerResult
id: 224a63ae-e278-4a11-b7c2-02ec3e17b56c
triggerThreshold: 0
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: LC_Username
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: LC_URL
- entityType: DNS
  fieldMappings:
  - identifier: DomainName
    columnName: LC_Domain
queryFrequency: 30m
alertDetailsOverride:
  alertDescriptionFormat: |
        A leaked set of credentials associated with {{LC_Username}} was detected. Domain {{LC_Domain}} Source URL {{LC_URL}}
  alertDynamicProperties: []
  alertDisplayNameFormat: Leaked Credentials Detected {{LC_Username}}
description: |
    'Detects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    enabled: false
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
customDetails:
  Leak_Date: LC_Date
  Leak_Url: LC_URL
  Service: Service
  MappedSeverity: Severity
  Leak_Tags: LC_Tags
  Status: Status
  AlertID: AlertID
  Leak_Data: LC_Data
  Leak_Username: LC_Username
  MappedSeveritry: MappedSeverity
relevantTechniques:
- T1552
- T1082
tactics:
- CredentialAccess
- Discovery
- Reconnaissance