Cyble Vision Alerts OSINT Mention Detected
| Id | 9ff985d8-57a8-4302-a8e6-34fa96c3c505 |
| Rulename | Cyble Vision Alerts OSINT Mention Detected |
| Description | Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation. |
| Severity | Low |
| Tactics | Reconnaissance ResourceDevelopment |
| Techniques | T1592 T1589 |
| Required data connectors | CybleVisionAlerts |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml |
| Version | 1.0.0 |
| Arm template | 9ff985d8-57a8-4302-a8e6-34fa96c3c505.json |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
name: Cyble Vision Alerts OSINT Mention Detected
id: 9ff985d8-57a8-4302-a8e6-34fa96c3c505
enabled: true
entityMappings:
- fieldMappings:
- columnName: MA_Domain
identifier: DomainName
entityType: DNS
- fieldMappings:
- columnName: MA_DomainURL
identifier: Url
entityType: URL
- fieldMappings:
- columnName: KeywordName
identifier: Name
entityType: Account
- fieldMappings:
- columnName: Domain
identifier: HostName
entityType: Host
version: 1.0.0
triggerOperator: GreaterThan
query: |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
description: |
'Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation.'
kind: Scheduled
queryfrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml
severity: Low
incidentConfiguration:
createIncident: true
alertDisplayNameFormat: OSINT Mention Identified for Monitored Keyword {{KeywordName}}
alertDetailsOverride:
alertDescriptionFormat: |
A public OSINT mention referencing monitored keyword/entity {{KeywordName}} has been detected. Source {{OS_Source}}. Mention URL {{OS_MentionURL}}. This may indicate reputational impact, data exposure, or adversarial research targeting the organization.
groupingConfiguration:
lookbackDuration: PT5H
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
- CybleVisionAlerts_CL
connectorId: CybleVisionAlerts
status: Available
customDetails:
AlertID: AlertID
MentionDate: OS_MentionDate
AuthorUsername: OS_AuthorUsername
AuthorName: OS_AuthorName
Service: Service
PostSnippet: OS_PostSnippet
Status: Status
Source: OS_Source
MappedSeverity: Severity
MentionURL: OS_MentionURL
eventGroupingSettings:
aggregationKind: AlertPerResult
relevantTechniques:
- T1592
- T1589
tactics:
- Reconnaissance
- ResourceDevelopment