Alerts_pastebin
| where Service == "pastebin"
| extend MappedSeverity = Severity
customDetails:
Status: Status
PasteUpdatedOn: PB_ContentUpdatedOn
AlertID: AlertID
Service: Service
PasteURL: PB_Data_URL
PasteID: PB_Data_PasteID
MappedSeverity: Severity
PasteAuthor: PB_Author
kind: Scheduled
severity: Low
description: |
'Cyble detected a paste containing references to monitored keywords or domains. Pastebin/Gist exposure may indicate data leakage or threat actor activity referencing the organization.'
triggerOperator: GreaterThan
status: Available
enabled: true
query: |
Alerts_pastebin
| where Service == "pastebin"
| extend MappedSeverity = Severity
triggerThreshold: 0
relevantTechniques:
- T1591
version: 1.0.0
queryfrequency: 30m
entityMappings:
- fieldMappings:
- identifier: DomainName
columnName: MA_Domain
entityType: DNS
- fieldMappings:
- identifier: Url
columnName: MA_DomainURL
entityType: URL
- fieldMappings:
- identifier: Name
columnName: KeywordName
entityType: Account
- fieldMappings:
- identifier: HostName
columnName: Domain
entityType: Host
requiredDataConnectors:
- connectorId: CybleVisionAlerts
dataTypes:
- CybleVisionAlerts_CL
queryPeriod: 30m
tactics:
- Reconnaissance
name: Cyble Vision Alerts Pastebin
id: dd37e041-3973-482a-aa8c-f484b4178940
eventGroupingSettings:
aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_pastebin_rule.yaml
incidentConfiguration:
alertDisplayNameFormat: Pastebin/Gist Exposure for Keyword {{KeywordName}}
alertDetailsOverride:
alertDescriptionFormat: |
A public paste has been detected referencing monitored keyword {{KeywordName}}. Paste Author {{PB_Author}}. URL {{PB_Data_URL}}. This may indicate sensitive information exposure or monitoring by external actors.
groupingConfiguration:
matchingMethod: AllEntities
enabled: false
reopenClosedIncident: false
lookbackDuration: PT5H
createIncident: true