Alerts_phishing
| where Service == "phishing"
| extend MappedSeverity = Severity
customDetails:
Status: Status
PH_IsLive: PH_IsLive
PH_DomainName: PH_DomainName
PH_DetectedAt: PH_DetectedAt
PH_ScreenshotURL: PH_ScreenshotURL
PH_Title: PH_Title
PH_Score: PH_Score
PH_PhishingStatus: PH_PhishingStatus
PH_HostName: PH_HostName
PH_AWSObjectName: PH_AWSObjectName
AlertID: AlertID
Service: Service
PH_LastLiveOn: PH_LastLiveOn
PH_PhishingKeyword: PH_PhishingKeyword
MappedSeverity: Severity
PH_Top_Domain: PH_Top_Domain
kind: Scheduled
severity: Low
description: |
'Cyble detected a phishing website impersonating a monitored brand. This alert provides landing page, host, screenshot, status and configured keyword for SOC triage.'
triggerOperator: GreaterThan
status: Available
enabled: true
query: |
Alerts_phishing
| where Service == "phishing"
| extend MappedSeverity = Severity
triggerThreshold: 0
relevantTechniques:
- T1598.003
version: 1.0.0
queryfrequency: 30m
entityMappings:
- fieldMappings:
- identifier: Url
columnName: PH_DomainName
entityType: Url
- fieldMappings:
- identifier: HostName
columnName: PH_HostName
entityType: Host
requiredDataConnectors:
- connectorId: CybleVisionAlerts
dataTypes:
- CybleVisionAlerts_CL
queryPeriod: 30m
tactics:
- Reconnaissance
name: Cyble Vision Alerts Phishing Domain Detected
id: eb1d45fe-1b19-4b54-b146-971f282a6fd9
eventGroupingSettings:
aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_phishing_rule.yaml
incidentConfiguration:
alertDisplayNameFormat: Phishing Detected {{PH_PhishingKeyword}} on {{PH_DomainName}}
alertDetailsOverride:
alertDescriptionFormat: |
A phishing landing page impersonating {{PH_Brand}}.
Host {{PH_HostName}}
Live {{PH_IsLive}}
groupingConfiguration:
matchingMethod: AllEntities
enabled: false
reopenClosedIncident: false
lookbackDuration: PT5H
createIncident: true