Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Leaked Credentials

Back
Id224a63ae-e278-4a11-b7c2-02ec3e17b56c
RulenameCyble Vision Alerts Leaked Credentials
DescriptionDetects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.
SeverityLow
TacticsCredentialAccess
Discovery
Reconnaissance
TechniquesT1552
T1082
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
Version1.0.0
Arm template224a63ae-e278-4a11-b7c2-02ec3e17b56c.json
Deploy To Azure
Alerts_leaked_credentials
| where Service == "leaked_credentials"
| extend MappedSeverity = Severity
id: 224a63ae-e278-4a11-b7c2-02ec3e17b56c
enabled: true
relevantTechniques:
- T1552
- T1082
suppressionDuration: PT5H
query: |
  Alerts_leaked_credentials
  | where Service == "leaked_credentials"
  | extend MappedSeverity = Severity  
entityMappings:
- fieldMappings:
  - identifier: Name
    columnName: LC_Username
  entityType: Account
- fieldMappings:
  - identifier: Url
    columnName: LC_URL
  entityType: URL
- fieldMappings:
  - identifier: DomainName
    columnName: LC_Domain
  entityType: DNS
eventGroupingSettings:
  aggregationKind: AlertPerResult
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
triggerOperator: GreaterThan
queryFrequency: 30m
queryPeriod: 30m
status: Available
incidentConfiguration:
  groupingConfiguration:
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
  createIncident: true
subTechniques: []
name: Cyble Vision Alerts Leaked Credentials
kind: Scheduled
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
description: |
    'Detects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.'
severity: Low
tactics:
- CredentialAccess
- Discovery
- Reconnaissance
triggerThreshold: 0
version: 1.0.0
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: Leaked Credentials Detected {{LC_Username}}
  alertDescriptionFormat: |
        A leaked set of credentials associated with {{LC_Username}} was detected. Domain {{LC_Domain}} Source URL {{LC_URL}}
customDetails:
  Leak_Tags: LC_Tags
  Leak_Url: LC_URL
  AlertID: AlertID
  Leak_Username: LC_Username
  MappedSeveritry: MappedSeverity
  Leak_Date: LC_Date
  Service: Service
  Leak_Data: LC_Data
  Status: Status
  MappedSeverity: Severity