Cyble Vision Alerts OSINT Mention Detected
| Id | 9ff985d8-57a8-4302-a8e6-34fa96c3c505 |
| Rulename | Cyble Vision Alerts OSINT Mention Detected |
| Description | Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation. |
| Severity | Low |
| Tactics | Reconnaissance ResourceDevelopment |
| Techniques | T1592 T1589 |
| Required data connectors | CybleVisionAlerts |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml |
| Version | 1.0.0 |
| Arm template | 9ff985d8-57a8-4302-a8e6-34fa96c3c505.json |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
customDetails:
Status: Status
PostSnippet: OS_PostSnippet
Service: Service
MentionDate: OS_MentionDate
Source: OS_Source
MentionURL: OS_MentionURL
AuthorName: OS_AuthorName
AuthorUsername: OS_AuthorUsername
MappedSeverity: Severity
AlertID: AlertID
severity: Low
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml
query: |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
requiredDataConnectors:
- dataTypes:
- CybleVisionAlerts_CL
connectorId: CybleVisionAlerts
incidentConfiguration:
alertDetailsOverride:
alertDisplayNameFormat: OSINT Mention Identified for Monitored Keyword {{KeywordName}}
createIncident: true
groupingConfiguration:
reopenClosedIncident: false
enabled: false
matchingMethod: AllEntities
lookbackDuration: PT5H
alertDescriptionFormat: |
A public OSINT mention referencing monitored keyword/entity {{KeywordName}} has been detected. Source {{OS_Source}}. Mention URL {{OS_MentionURL}}. This may indicate reputational impact, data exposure, or adversarial research targeting the organization.
relevantTechniques:
- T1592
- T1589
kind: Scheduled
name: Cyble Vision Alerts OSINT Mention Detected
tactics:
- Reconnaissance
- ResourceDevelopment
eventGroupingSettings:
aggregationKind: AlertPerResult
entityMappings:
- fieldMappings:
- identifier: DomainName
columnName: MA_Domain
entityType: DNS
- fieldMappings:
- identifier: Url
columnName: MA_DomainURL
entityType: URL
- fieldMappings:
- identifier: Name
columnName: KeywordName
entityType: Account
- fieldMappings:
- identifier: HostName
columnName: Domain
entityType: Host
enabled: true
queryfrequency: 30m
description: |
'Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation.'
triggerThreshold: 0
triggerOperator: GreaterThan
version: 1.0.0
queryPeriod: 30m
id: 9ff985d8-57a8-4302-a8e6-34fa96c3c505