Alerts_pastebin
| where Service == "pastebin"
| extend MappedSeverity = Severity
description: |
'Cyble detected a paste containing references to monitored keywords or domains. Pastebin/Gist exposure may indicate data leakage or threat actor activity referencing the organization.'
version: 1.0.0
tactics:
- Reconnaissance
queryfrequency: 30m
query: |
Alerts_pastebin
| where Service == "pastebin"
| extend MappedSeverity = Severity
status: Available
triggerOperator: GreaterThan
kind: Scheduled
triggerThreshold: 0
customDetails:
Status: Status
PasteAuthor: PB_Author
MappedSeverity: Severity
PasteURL: PB_Data_URL
PasteUpdatedOn: PB_ContentUpdatedOn
Service: Service
AlertID: AlertID
PasteID: PB_Data_PasteID
enabled: true
relevantTechniques:
- T1591
id: dd37e041-3973-482a-aa8c-f484b4178940
queryPeriod: 30m
entityMappings:
- fieldMappings:
- identifier: DomainName
columnName: MA_Domain
entityType: DNS
- fieldMappings:
- identifier: Url
columnName: MA_DomainURL
entityType: URL
- fieldMappings:
- identifier: Name
columnName: KeywordName
entityType: Account
- fieldMappings:
- identifier: HostName
columnName: Domain
entityType: Host
eventGroupingSettings:
aggregationKind: AlertPerResult
severity: Low
name: Cyble Vision Alerts Pastebin
incidentConfiguration:
groupingConfiguration:
lookbackDuration: PT5H
enabled: false
reopenClosedIncident: false
matchingMethod: AllEntities
alertDisplayNameFormat: Pastebin/Gist Exposure for Keyword {{KeywordName}}
alertDetailsOverride:
alertDescriptionFormat: |
A public paste has been detected referencing monitored keyword {{KeywordName}}. Paste Author {{PB_Author}}. URL {{PB_Data_URL}}. This may indicate sensitive information exposure or monitoring by external actors.
createIncident: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_pastebin_rule.yaml
requiredDataConnectors:
- dataTypes:
- CybleVisionAlerts_CL
connectorId: CybleVisionAlerts