Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts IOCS

Back
Idc8cf42d5-8684-435f-9c4d-9dd0cc47eaec
RulenameCyble Vision Alerts IOC’S
DescriptionDetects malicious Indicators of Compromise such as IPs, domains, URLs, and hashes. Extracts IOC type, behaviour tags, risk rating, and timestamps using Alerts_IOCs parser. Triggers an incident with mapped entities, severity, and details.
SeverityLow
TacticsReconnaissance
InitialAccess
Discovery
CommandAndControl
Impact
TechniquesT1595
T1133
T1046
T1071
T1486
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_IOC’S.yaml
Version1.0.0
Arm templatec8cf42d5-8684-435f-9c4d-9dd0cc47eaec.json
Deploy To Azure
Alerts_iocs 
| where Service == "iocs" 
| extend MappedSeverity = Severity
name: Cyble Vision Alerts IOC'S
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision IOC Detected {{IOC_Value}}
  alertDescriptionFormat: |
        Type {{IOC_Type}} Behaviour {{IOC_BehaviourTags}} Risk Rating {{IOC_RiskRating}}'
query: |
  Alerts_iocs 
  | where Service == "iocs" 
  | extend MappedSeverity = Severity  
id: c8cf42d5-8684-435f-9c4d-9dd0cc47eaec
enabled: true
entityMappings:
- fieldMappings:
  - columnName: IOC_Value
    identifier: Address
  entityType: IP
version: 1.0.0
triggerOperator: GreaterThan
suppressionDuration: PT5H
description: |
    'Detects malicious Indicators of Compromise such as IPs, domains, URLs, and hashes. Extracts IOC type, behaviour tags, risk rating, and timestamps using Alerts_IOCs parser. Triggers an incident with mapped entities, severity, and details.'
kind: Scheduled
queryFrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_IOC'S.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
subTechniques: []
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  Tags: IOC_Tags
  IOCConfidentRating: IOC_ConfidentRating
  MappedSeverity: Severity
  Reference: IOC_ReferenceLink
  IOCType: IOC_Type
  LastSeen: IOC_LastSeen
  FirstSeen: IOC_FirstSeen
  IOCAttackName: IOC_AttackName
  AlertID: AlertID
  Service: Service
  IOC: IOC_Value
  IOCRiskRating: IOC_RiskRating
  UUID: IOC_UUID
  Status: Status
  IOCBehaviour: IOC_BehaviourTags
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1595
- T1133
- T1046
- T1071
- T1486
tactics:
- Reconnaissance
- InitialAccess
- Discovery
- CommandAndControl
- Impact