Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts OSINT Mention Detected

Back
Id9ff985d8-57a8-4302-a8e6-34fa96c3c505
RulenameCyble Vision Alerts OSINT Mention Detected
DescriptionTriggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation.
SeverityLow
TacticsReconnaissance
ResourceDevelopment
TechniquesT1592
T1589
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml
Version1.0.0
Arm template9ff985d8-57a8-4302-a8e6-34fa96c3c505.json
Deploy To Azure
Alerts_osint  
| where Service == "osint" 
| extend MappedSeverity = Severity
name: Cyble Vision Alerts OSINT Mention Detected
id: 9ff985d8-57a8-4302-a8e6-34fa96c3c505
enabled: true
entityMappings:
- fieldMappings:
  - columnName: MA_Domain
    identifier: DomainName
  entityType: DNS
- fieldMappings:
  - columnName: MA_DomainURL
    identifier: Url
  entityType: URL
- fieldMappings:
  - columnName: KeywordName
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: Domain
    identifier: HostName
  entityType: Host
version: 1.0.0
triggerOperator: GreaterThan
query: |
  Alerts_osint  
  | where Service == "osint" 
  | extend MappedSeverity = Severity  
description: |
    'Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation.'
kind: Scheduled
queryfrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  alertDisplayNameFormat: OSINT Mention Identified for Monitored Keyword {{KeywordName}}
  alertDetailsOverride: 
  alertDescriptionFormat: |
        A public OSINT mention referencing monitored keyword/entity {{KeywordName}} has been detected. Source {{OS_Source}}. Mention URL {{OS_MentionURL}}. This may indicate reputational impact, data exposure, or adversarial research targeting the organization.
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  AlertID: AlertID
  MentionDate: OS_MentionDate
  AuthorUsername: OS_AuthorUsername
  AuthorName: OS_AuthorName
  Service: Service
  PostSnippet: OS_PostSnippet
  Status: Status
  Source: OS_Source
  MappedSeverity: Severity
  MentionURL: OS_MentionURL
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1592
- T1589
tactics:
- Reconnaissance
- ResourceDevelopment