Cyble Vision Alerts OSINT Mention Detected
| Id | 9ff985d8-57a8-4302-a8e6-34fa96c3c505 |
| Rulename | Cyble Vision Alerts OSINT Mention Detected |
| Description | Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation. |
| Severity | Low |
| Tactics | Reconnaissance ResourceDevelopment |
| Techniques | T1592 T1589 |
| Required data connectors | CybleVisionAlerts |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml |
| Version | 1.0.0 |
| Arm template | 9ff985d8-57a8-4302-a8e6-34fa96c3c505.json |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
customDetails:
AuthorName: OS_AuthorName
Source: OS_Source
MentionDate: OS_MentionDate
AuthorUsername: OS_AuthorUsername
MentionURL: OS_MentionURL
MappedSeverity: Severity
AlertID: AlertID
PostSnippet: OS_PostSnippet
Service: Service
Status: Status
id: 9ff985d8-57a8-4302-a8e6-34fa96c3c505
name: Cyble Vision Alerts OSINT Mention Detected
queryPeriod: 30m
requiredDataConnectors:
- connectorId: CybleVisionAlerts
dataTypes:
- CybleVisionAlerts_CL
incidentConfiguration:
createIncident: true
alertDetailsOverride:
alertDescriptionFormat: |
A public OSINT mention referencing monitored keyword/entity {{KeywordName}} has been detected. Source {{OS_Source}}. Mention URL {{OS_MentionURL}}. This may indicate reputational impact, data exposure, or adversarial research targeting the organization.
alertDisplayNameFormat: OSINT Mention Identified for Monitored Keyword {{KeywordName}}
groupingConfiguration:
enabled: false
matchingMethod: AllEntities
lookbackDuration: PT5H
reopenClosedIncident: false
version: 1.0.0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml
query: |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
eventGroupingSettings:
aggregationKind: AlertPerResult
relevantTechniques:
- T1592
- T1589
entityMappings:
- entityType: DNS
fieldMappings:
- identifier: DomainName
columnName: MA_Domain
- entityType: URL
fieldMappings:
- identifier: Url
columnName: MA_DomainURL
- entityType: Account
fieldMappings:
- identifier: Name
columnName: KeywordName
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: Domain
enabled: true
severity: Low
kind: Scheduled
triggerThreshold: 0
triggerOperator: GreaterThan
tactics:
- Reconnaissance
- ResourceDevelopment
status: Available
queryfrequency: 30m
description: |
'Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation.'