Alerts_phishing
| where Service == "phishing"
| extend MappedSeverity = Severity
description: |
'Cyble detected a phishing website impersonating a monitored brand. This alert provides landing page, host, screenshot, status and configured keyword for SOC triage.'
kind: Scheduled
queryfrequency: 30m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_phishing_rule.yaml
eventGroupingSettings:
aggregationKind: AlertPerResult
severity: Low
triggerOperator: GreaterThan
triggerThreshold: 0
name: Cyble Vision Alerts Phishing Domain Detected
customDetails:
PH_ScreenshotURL: PH_ScreenshotURL
MappedSeverity: Severity
AlertID: AlertID
Service: Service
PH_LastLiveOn: PH_LastLiveOn
PH_Top_Domain: PH_Top_Domain
PH_Title: PH_Title
PH_HostName: PH_HostName
PH_PhishingStatus: PH_PhishingStatus
PH_DetectedAt: PH_DetectedAt
PH_PhishingKeyword: PH_PhishingKeyword
PH_DomainName: PH_DomainName
PH_IsLive: PH_IsLive
Status: Status
PH_AWSObjectName: PH_AWSObjectName
PH_Score: PH_Score
entityMappings:
- fieldMappings:
- columnName: PH_DomainName
identifier: Url
entityType: Url
- fieldMappings:
- columnName: PH_HostName
identifier: HostName
entityType: Host
requiredDataConnectors:
- connectorId: CybleVisionAlerts
dataTypes:
- CybleVisionAlerts_CL
enabled: true
id: eb1d45fe-1b19-4b54-b146-971f282a6fd9
queryPeriod: 30m
incidentConfiguration:
createIncident: true
alertDescriptionFormat: |
A phishing landing page impersonating {{PH_Brand}}.
Host {{PH_HostName}}
Live {{PH_IsLive}}
groupingConfiguration:
enabled: false
matchingMethod: AllEntities
reopenClosedIncident: false
lookbackDuration: PT5H
alertDisplayNameFormat: Phishing Detected {{PH_PhishingKeyword}} on {{PH_DomainName}}
alertDetailsOverride:
tactics:
- Reconnaissance
relevantTechniques:
- T1598.003
status: Available
version: 1.0.0
query: |
Alerts_phishing
| where Service == "phishing"
| extend MappedSeverity = Severity