Cyble Vision Alerts OSINT Mention Detected
| Id | 9ff985d8-57a8-4302-a8e6-34fa96c3c505 |
| Rulename | Cyble Vision Alerts OSINT Mention Detected |
| Description | Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation. |
| Severity | Low |
| Tactics | Reconnaissance ResourceDevelopment |
| Techniques | T1592 T1589 |
| Required data connectors | CybleVisionAlerts |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml |
| Version | 1.0.0 |
| Arm template | 9ff985d8-57a8-4302-a8e6-34fa96c3c505.json |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
queryPeriod: 30m
severity: Low
description: |
'Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation.'
entityMappings:
- entityType: DNS
fieldMappings:
- identifier: DomainName
columnName: MA_Domain
- entityType: URL
fieldMappings:
- identifier: Url
columnName: MA_DomainURL
- entityType: Account
fieldMappings:
- identifier: Name
columnName: KeywordName
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: Domain
triggerOperator: GreaterThan
status: Available
tactics:
- Reconnaissance
- ResourceDevelopment
relevantTechniques:
- T1592
- T1589
id: 9ff985d8-57a8-4302-a8e6-34fa96c3c505
triggerThreshold: 0
queryfrequency: 30m
incidentConfiguration:
alertDisplayNameFormat: OSINT Mention Identified for Monitored Keyword {{KeywordName}}
alertDetailsOverride:
groupingConfiguration:
reopenClosedIncident: false
lookbackDuration: PT5H
matchingMethod: AllEntities
enabled: false
alertDescriptionFormat: |
A public OSINT mention referencing monitored keyword/entity {{KeywordName}} has been detected. Source {{OS_Source}}. Mention URL {{OS_MentionURL}}. This may indicate reputational impact, data exposure, or adversarial research targeting the organization.
createIncident: true
enabled: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml
query: |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
customDetails:
AuthorUsername: OS_AuthorUsername
MentionDate: OS_MentionDate
MappedSeverity: Severity
Service: Service
Status: Status
MentionURL: OS_MentionURL
AuthorName: OS_AuthorName
AlertID: AlertID
PostSnippet: OS_PostSnippet
Source: OS_Source
requiredDataConnectors:
- dataTypes:
- CybleVisionAlerts_CL
connectorId: CybleVisionAlerts
version: 1.0.0
eventGroupingSettings:
aggregationKind: AlertPerResult
name: Cyble Vision Alerts OSINT Mention Detected
kind: Scheduled