DataminrPulseAlerts
| where EventSource in~ ('Greynoise', 'Shodan', 'VirusTotal', 'alienvault open threat exchange', 'urlscan')
and AlertType == "Urgent"
alertDetailsOverride:
alertDescriptionFormat: '{{Caption}}'
alertDisplayNameFormat: 'Dataminr Alert: {{AlertId}}'
description: |
'Rule helps to detect whenever there is an alert found which has urgent alert-type in Dataminr.'
kind: Scheduled
tactics:
- Persistence
requiredDataConnectors:
- connectorId: DataminrPulseAlerts
dataTypes:
- DataminrPulseAlerts
incidentConfiguration:
createIncident: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dataminr Pulse/Analytic Rules/DataminrSentinelAlerts.yaml
severity: Medium
name: Dataminr - urgent alerts detected
triggerThreshold: 0
queryPeriod: 5m
query: |
DataminrPulseAlerts
| where EventSource in~ ('Greynoise', 'Shodan', 'VirusTotal', 'alienvault open threat exchange', 'urlscan')
and AlertType == "Urgent"
relevantTechniques:
- T1546
id: 64a46029-3236-4d03-b5df-207366a623f1
queryFrequency: 5m
status: Available
version: 1.0.0
triggerOperator: GreaterThan
eventGroupingSettings:
aggregationKind: SingleAlert
entityMappings:
- entityType: URL
fieldMappings:
- columnName: PostLink
identifier: Url