Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

CybleVision Alerts Telegram Mentions

Back
Id4238f545-8b6f-4f7c-80b5-14cca2cebc99
RulenameCybleVision Alerts Telegram Mentions
DescriptionDetects mentions of monitored keywords across Telegram channels and groups. Extracts message content, URLs, chat metadata, user identity, and timestamps.
SeverityLow
TacticsReconnaissance
ResourceDevelopment
InitialAccess
CommandAndControl
TechniquesT1598
T1585
T1102
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Telegram_Mentions.yaml
Version1.0.0
Arm template4238f545-8b6f-4f7c-80b5-14cca2cebc99.json
Deploy To Azure
Alerts_telegram_mentions 
| where Service == "telegram_mentions" 
| extend MappedSeverity = Severity
name: CybleVision Alerts Telegram Mentions
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Telegram Mention in {{TG_ChatTitle}}
  alertDescriptionFormat: |
        A Telegram post mentioning monitored keywords was detected. User {{TG_Username2}}. Message {{TG_Message}} URL {{TG_Urls}}\n
query: |
  Alerts_telegram_mentions 
  | where Service == "telegram_mentions" 
  | extend MappedSeverity = Severity  
id: 4238f545-8b6f-4f7c-80b5-14cca2cebc99
enabled: true
entityMappings:
- fieldMappings:
  - columnName: TG_Username2
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: TG_Urls
    identifier: Url
  entityType: URL
version: 1.0.0
triggerOperator: GreaterThan
suppressionDuration: PT5H
description: |
    'Detects mentions of monitored keywords across Telegram channels and groups. Extracts message content, URLs, chat metadata, user identity, and timestamps.'
kind: Scheduled
queryFrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Telegram_Mentions.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
subTechniques: []
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  Tags: TG_Tags
  MappedSeverity: Severity
  URLs: TG_Urls
  User: TG_Username2
  ChatID: TG_ChatID
  Message: TG_Message
  AlertID: AlertID
  Service: Service
  ChatTitle: TG_ChatTitle
  CreatedDate: TG_CreatedDate
  Status: Status
  UpdatedDate: TG_UpdatedDate
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1598
- T1585
- T1102
tactics:
- Reconnaissance
- ResourceDevelopment
- InitialAccess
- CommandAndControl