Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Hacktivism

Back
Id6649e5a0-0365-452f-84b3-448a0aec7a59
RulenameCyble Vision Alerts Hacktivism
DescriptionDetects hacktivist activity (Telegram posts, defacements, site takedowns, etc.) using the Alerts_Hacktivism parser. Extracts post content, attacker/team,domains, links, IPs, media and metadata for triage.
SeverityLow
TacticsReconnaissance
Impact
ResourceDevelopment
TechniquesT1595
T1491
T1498
T1585
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_hacktivism.yaml
Version1.0.0
Arm template6649e5a0-0365-452f-84b3-448a0aec7a59.json
Deploy To Azure
Alerts_hacktivism 
| where Service contains "hacktivism" 
| extend Mappedseverity = Severity
id: 6649e5a0-0365-452f-84b3-448a0aec7a59
enabled: true
relevantTechniques:
- T1595
- T1491
- T1498
- T1585
suppressionDuration: PT5H
query: |
  Alerts_hacktivism 
  | where Service contains "hacktivism" 
  | extend Mappedseverity = Severity  
entityMappings:
- fieldMappings:
  - identifier: Name
    columnName: HK_AttackerTeam
  entityType: Account
- fieldMappings:
  - identifier: Url
    columnName: HK_All_URLs
  entityType: URL
- fieldMappings:
  - identifier: DomainName
    columnName: HK_All_Domains
  entityType: DNS
- fieldMappings:
  - identifier: Address
    columnName: HK_IP
  entityType: IP
eventGroupingSettings:
  aggregationKind: AlertPerResult
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
triggerOperator: GreaterThan
queryFrequency: 30m
queryPeriod: 30m
status: Available
incidentConfiguration:
  groupingConfiguration:
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
  createIncident: true
subTechniques: []
name: Cyble Vision Alerts Hacktivism
kind: Scheduled
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_hacktivism.yaml
description: |
    'Detects hacktivist activity (Telegram posts, defacements, site takedowns, etc.) using the Alerts_Hacktivism parser. Extracts post content, attacker/team,domains, links, IPs, media and metadata for triage.'
severity: Low
tactics:
- Reconnaissance
- Impact
- ResourceDevelopment
triggerThreshold: 0
version: 1.0.0
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Hacktivism {{HK_ChannelName}} / {{HK_AttackerTeam}}
  alertDescriptionFormat: |
        Hacktivism activity detected. Attacker/Team {{HK_AttackerTeam}} Post excerpt {{HK_PostData}} Domains/Links {{HK_All_Domains}}
customDetails:
  Tags: HK_Tags
  TargetDomain: HK_Domain
  PostID: HK_PostID
  Status: Status
  Server: HK_Server
  Phones: HK_Phones
  SourceWebsite: HK_SourceWebsite
  WebsiteURL: HK_WebsiteURL
  ChannelLink: HK_ChannelLink
  PostedAt: HK_PostedAt
  Attacker: HK_Attacker
  MappedSeverity: Severity
  Emails: HK_Emails
  Source: HK_SourceWebsite
  Service: Service
  AlertID: AlertID
  PostText: HK_PostData
  ChannelName: HK_ChannelName