Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Hacktivism

Back
Id6649e5a0-0365-452f-84b3-448a0aec7a59
RulenameCyble Vision Alerts Hacktivism
DescriptionDetects hacktivist activity (Telegram posts, defacements, site takedowns, etc.) using the Alerts_Hacktivism parser. Extracts post content, attacker/team,domains, links, IPs, media and metadata for triage.
SeverityLow
TacticsReconnaissance
Impact
ResourceDevelopment
TechniquesT1595
T1491
T1498
T1585
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_hacktivism.yaml
Version1.0.0
Arm template6649e5a0-0365-452f-84b3-448a0aec7a59.json
Deploy To Azure
Alerts_hacktivism 
| where Service contains "hacktivism" 
| extend Mappedseverity = Severity
queryPeriod: 30m
severity: Low
description: |
    'Detects hacktivist activity (Telegram posts, defacements, site takedowns, etc.) using the Alerts_Hacktivism parser. Extracts post content, attacker/team,domains, links, IPs, media and metadata for triage.'
subTechniques: []
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: HK_AttackerTeam
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: HK_All_URLs
- entityType: DNS
  fieldMappings:
  - identifier: DomainName
    columnName: HK_All_Domains
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: HK_IP
triggerOperator: GreaterThan
status: Available
tactics:
- Reconnaissance
- Impact
- ResourceDevelopment
relevantTechniques:
- T1595
- T1491
- T1498
- T1585
id: 6649e5a0-0365-452f-84b3-448a0aec7a59
triggerThreshold: 0
suppressionDuration: PT5H
queryFrequency: 30m
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    lookbackDuration: PT5H
    matchingMethod: AllEntities
    enabled: false
  createIncident: true
enabled: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_hacktivism.yaml
query: |
  Alerts_hacktivism 
  | where Service contains "hacktivism" 
  | extend Mappedseverity = Severity  
version: 1.0.0
customDetails:
  PostedAt: HK_PostedAt
  TargetDomain: HK_Domain
  AlertID: AlertID
  Phones: HK_Phones
  PostText: HK_PostData
  PostID: HK_PostID
  Emails: HK_Emails
  Status: Status
  Server: HK_Server
  MappedSeverity: Severity
  Attacker: HK_Attacker
  Source: HK_SourceWebsite
  SourceWebsite: HK_SourceWebsite
  Tags: HK_Tags
  ChannelName: HK_ChannelName
  WebsiteURL: HK_WebsiteURL
  ChannelLink: HK_ChannelLink
  Service: Service
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Hacktivism {{HK_ChannelName}} / {{HK_AttackerTeam}}
  alertDescriptionFormat: |
        Hacktivism activity detected. Attacker/Team {{HK_AttackerTeam}} Post excerpt {{HK_PostData}} Domains/Links {{HK_All_Domains}}
eventGroupingSettings:
  aggregationKind: AlertPerResult
name: Cyble Vision Alerts Hacktivism
kind: Scheduled