Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

CybleVision Alerts Darkweb Marketplace Alerts

Back
Ide80eedb4-cbae-45cc-b1be-a2a8dc31af3b
RulenameCybleVision Alerts Darkweb Marketplace Alerts
DescriptionDetects stolen credentials, financial information, stealer logs, and related payloads listed on Darkweb marketplaces such as RussianMarket. Extracts card data, victim info, metadata, and marketplace context via Alerts_DarkwebMarketplaces.
SeverityLow
TacticsCredentialAccess
Collection
Exfiltration
Reconnaissance
TechniquesT1555
T1005
T1041
T1589
T1646
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Darkweb_Marketplace.yaml
Version1.0.0
Arm templatee80eedb4-cbae-45cc-b1be-a2a8dc31af3b.json
Deploy To Azure
Alerts_darkweb_marketplaces 
| where Service == "darkweb_marketplaces" 
| extend MappedSeverity = Severity
customDetails:
  Status: Status
  Date: DW_Date
  Price: DW_Price
  Info: DW_Info
  Tags: DW_Tags
  Service: Service
  Vendor: DW_Vendor
  Marketplace: DW_Marketplace
  UpdatedDate: DW_UpdatedDate
  RealName: DW_Bank_RealName
  AlertID: AlertID
  Links: DW_Links
  Region: DW_Region
  RawData: DW_RawData
  BankBrand: DW_Bank_Brand
  BankCard: DW_Bank_CardNo
  MappedSeverity: Severity
  BankExpiry: DW_Bank_Expiry
  Country: DW_Country
  Stealer: DW_StealerName
kind: Scheduled
severity: Low
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
description: |
    'Detects stolen credentials, financial information, stealer logs, and related payloads listed on Darkweb marketplaces such as RussianMarket. Extracts card data, victim info, metadata, and marketplace context via Alerts_DarkwebMarketplaces.'
triggerOperator: GreaterThan
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Darkweb Listing Found ({{DW_Marketplace}})
  alertDescriptionFormat: |
        A darkweb marketplace listing referencing your monitored assets was discovered. Vendor {{DW_Vendor}} Region {{DW_Region}} Links {{DW_Links}}\n
status: Available
enabled: true
query: |
  Alerts_darkweb_marketplaces 
  | where Service == "darkweb_marketplaces" 
  | extend MappedSeverity = Severity  
triggerThreshold: 0
relevantTechniques:
- T1555
- T1005
- T1041
- T1589
- T1646
version: 1.0.0
queryFrequency: 30m
subTechniques: []
suppressionDuration: PT5H
queryPeriod: 30m
tactics:
- CredentialAccess
- Collection
- Exfiltration
- Reconnaissance
name: CybleVision Alerts Darkweb Marketplace Alerts
id: e80eedb4-cbae-45cc-b1be-a2a8dc31af3b
eventGroupingSettings:
  aggregationKind: AlertPerResult
entityMappings:
- fieldMappings:
  - identifier: DomainName
    columnName: DW_Links
  entityType: DNS
- fieldMappings:
  - identifier: Name
    columnName: DW_Bank_BIN
  entityType: File
- fieldMappings:
  - identifier: Address
    columnName: DW_IP
  entityType: IP
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Darkweb_Marketplace.yaml
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    reopenClosedIncident: false
    lookbackDuration: PT5H