Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Leaked Credentials

Back
Id224a63ae-e278-4a11-b7c2-02ec3e17b56c
RulenameCyble Vision Alerts Leaked Credentials
DescriptionDetects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.
SeverityLow
TacticsCredentialAccess
Discovery
Reconnaissance
TechniquesT1552
T1082
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
Version1.0.0
Arm template224a63ae-e278-4a11-b7c2-02ec3e17b56c.json
Deploy To Azure
Alerts_leaked_credentials
| where Service == "leaked_credentials"
| extend MappedSeverity = Severity
relevantTechniques:
- T1552
- T1082
entityMappings:
- entityType: Account
  fieldMappings:
  - columnName: LC_Username
    identifier: Name
- entityType: URL
  fieldMappings:
  - columnName: LC_URL
    identifier: Url
- entityType: DNS
  fieldMappings:
  - columnName: LC_Domain
    identifier: DomainName
eventGroupingSettings:
  aggregationKind: AlertPerResult
version: 1.0.0
query: |
  Alerts_leaked_credentials
  | where Service == "leaked_credentials"
  | extend MappedSeverity = Severity  
id: 224a63ae-e278-4a11-b7c2-02ec3e17b56c
suppressionDuration: PT5H
severity: Low
kind: Scheduled
queryFrequency: 30m
description: |
    'Detects leaked credentials identified by CybleVision ingestion and triggers an incident with mapped entities, severity, and details.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
subTechniques: []
triggerOperator: GreaterThan
name: Cyble Vision Alerts Leaked Credentials
tactics:
- CredentialAccess
- Discovery
- Reconnaissance
alertDetailsOverride:
  alertDescriptionFormat: |
        A leaked set of credentials associated with {{LC_Username}} was detected. Domain {{LC_Domain}} Source URL {{LC_URL}}
  alertDynamicProperties: []
  alertDisplayNameFormat: Leaked Credentials Detected {{LC_Username}}
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Leaked_Credentials.yaml
triggerThreshold: 0
queryPeriod: 30m
enabled: true
status: Available
customDetails:
  MappedSeveritry: MappedSeverity
  Leak_Url: LC_URL
  Leak_Username: LC_Username
  Status: Status
  Leak_Tags: LC_Tags
  Service: Service
  Leak_Data: LC_Data
  MappedSeverity: Severity
  Leak_Date: LC_Date
  AlertID: AlertID
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities