@Rahul Ramachandran Thanks for reaching out. Are you referring to the Detection type field in Risky user reporting. Something like this :
Once the logs are sent to Sentinel, Sentinel would have option to query the Risky users and find if the event was raised for leaked credential. Are you looking for a dedicated KQL for this for creating a analytic query ?