Cyble Vision Alerts OSINT Mention Detected
| Id | 9ff985d8-57a8-4302-a8e6-34fa96c3c505 |
| Rulename | Cyble Vision Alerts OSINT Mention Detected |
| Description | Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation. |
| Severity | Low |
| Tactics | Reconnaissance ResourceDevelopment |
| Techniques | T1592 T1589 |
| Required data connectors | CybleVisionAlerts |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml |
| Version | 1.0.0 |
| Arm template | 9ff985d8-57a8-4302-a8e6-34fa96c3c505.json |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
relevantTechniques:
- T1592
- T1589
entityMappings:
- entityType: DNS
fieldMappings:
- columnName: MA_Domain
identifier: DomainName
- entityType: URL
fieldMappings:
- columnName: MA_DomainURL
identifier: Url
- entityType: Account
fieldMappings:
- columnName: KeywordName
identifier: Name
- entityType: Host
fieldMappings:
- columnName: Domain
identifier: HostName
version: 1.0.0
query: |
Alerts_osint
| where Service == "osint"
| extend MappedSeverity = Severity
id: 9ff985d8-57a8-4302-a8e6-34fa96c3c505
triggerOperator: GreaterThan
severity: Low
kind: Scheduled
queryfrequency: 30m
description: |
'Triggers when Cyble detects an OSINT mention related to monitored keywords, entities, or brand identifiers. OSINT findings may indicate data leaks, expose content, targeting activity, impersonation, or discussions that may require investigation.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
dataTypes:
- CybleVisionAlerts_CL
eventGroupingSettings:
aggregationKind: AlertPerResult
name: Cyble Vision Alerts OSINT Mention Detected
tactics:
- Reconnaissance
- ResourceDevelopment
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_osint_rule.yaml
triggerThreshold: 0
queryPeriod: 30m
enabled: true
status: Available
customDetails:
AuthorName: OS_AuthorName
AuthorUsername: OS_AuthorUsername
Source: OS_Source
MentionURL: OS_MentionURL
Status: Status
Service: Service
MappedSeverity: Severity
PostSnippet: OS_PostSnippet
AlertID: AlertID
MentionDate: OS_MentionDate
incidentConfiguration:
alertDisplayNameFormat: OSINT Mention Identified for Monitored Keyword {{KeywordName}}
alertDetailsOverride:
createIncident: true
groupingConfiguration:
lookbackDuration: PT5H
enabled: false
reopenClosedIncident: false
matchingMethod: AllEntities
alertDescriptionFormat: |
A public OSINT mention referencing monitored keyword/entity {{KeywordName}} has been detected. Source {{OS_Source}}. Mention URL {{OS_MentionURL}}. This may indicate reputational impact, data exposure, or adversarial research targeting the organization.