Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

CybleVision Alerts Darkweb Marketplace Alerts

Back
Ide80eedb4-cbae-45cc-b1be-a2a8dc31af3b
RulenameCybleVision Alerts Darkweb Marketplace Alerts
DescriptionDetects stolen credentials, financial information, stealer logs, and related payloads listed on Darkweb marketplaces such as RussianMarket. Extracts card data, victim info, metadata, and marketplace context via Alerts_DarkwebMarketplaces.
SeverityLow
TacticsCredentialAccess
Collection
Exfiltration
Reconnaissance
TechniquesT1555
T1005
T1041
T1589
T1646
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Darkweb_Marketplace.yaml
Version1.0.0
Arm templatee80eedb4-cbae-45cc-b1be-a2a8dc31af3b.json
Deploy To Azure
Alerts_darkweb_marketplaces 
| where Service == "darkweb_marketplaces" 
| extend MappedSeverity = Severity
relevantTechniques:
- T1555
- T1005
- T1041
- T1589
- T1646
entityMappings:
- entityType: DNS
  fieldMappings:
  - columnName: DW_Links
    identifier: DomainName
- entityType: File
  fieldMappings:
  - columnName: DW_Bank_BIN
    identifier: Name
- entityType: IP
  fieldMappings:
  - columnName: DW_IP
    identifier: Address
eventGroupingSettings:
  aggregationKind: AlertPerResult
version: 1.0.0
query: |
  Alerts_darkweb_marketplaces 
  | where Service == "darkweb_marketplaces" 
  | extend MappedSeverity = Severity  
id: e80eedb4-cbae-45cc-b1be-a2a8dc31af3b
suppressionDuration: PT5H
severity: Low
kind: Scheduled
queryFrequency: 30m
description: |
    'Detects stolen credentials, financial information, stealer logs, and related payloads listed on Darkweb marketplaces such as RussianMarket. Extracts card data, victim info, metadata, and marketplace context via Alerts_DarkwebMarketplaces.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
subTechniques: []
triggerOperator: GreaterThan
name: CybleVision Alerts Darkweb Marketplace Alerts
tactics:
- CredentialAccess
- Collection
- Exfiltration
- Reconnaissance
alertDetailsOverride:
  alertDescriptionFormat: |
        A darkweb marketplace listing referencing your monitored assets was discovered. Vendor {{DW_Vendor}} Region {{DW_Region}} Links {{DW_Links}}\n
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Darkweb Listing Found ({{DW_Marketplace}})
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Darkweb_Marketplace.yaml
triggerThreshold: 0
queryPeriod: 30m
enabled: true
status: Available
customDetails:
  Country: DW_Country
  Date: DW_Date
  Status: Status
  UpdatedDate: DW_UpdatedDate
  Stealer: DW_StealerName
  BankBrand: DW_Bank_Brand
  Marketplace: DW_Marketplace
  BankExpiry: DW_Bank_Expiry
  RealName: DW_Bank_RealName
  BankCard: DW_Bank_CardNo
  RawData: DW_RawData
  Links: DW_Links
  Info: DW_Info
  Tags: DW_Tags
  Service: Service
  Vendor: DW_Vendor
  AlertID: AlertID
  MappedSeverity: Severity
  Region: DW_Region
  Price: DW_Price
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities