Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts TOR Links

Back
Idb9df1ec4-a572-4448-8da1-1bc4b7e1687f
RulenameCyble Vision Alerts TOR Links
DescriptionDetects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.
SeverityLow
TacticsResourceDevelopment
Reconnaissance
TechniquesT1583
T1590
T1595
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
Version1.0.0
Arm templateb9df1ec4-a572-4448-8da1-1bc4b7e1687f.json
Deploy To Azure
Alerts_tor_links 
| where Service == "tor_links" 
| extend MappedSeverity = Severity
queryPeriod: 30m
severity: Low
description: |
    'Detects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.'
subTechniques: []
entityMappings:
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: TL_TorUrl
- entityType: DNS
  fieldMappings:
  - identifier: DomainName
    columnName: Domain
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: IP
triggerOperator: GreaterThan
status: Available
tactics:
- ResourceDevelopment
- Reconnaissance
relevantTechniques:
- T1583
- T1590
- T1595
id: b9df1ec4-a572-4448-8da1-1bc4b7e1687f
triggerThreshold: 0
suppressionDuration: PT5H
queryFrequency: 30m
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    lookbackDuration: PT5H
    matchingMethod: AllEntities
    enabled: false
  createIncident: true
enabled: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
query: |
  Alerts_tor_links 
  | where Service == "tor_links" 
  | extend MappedSeverity = Severity  
version: 1.0.0
customDetails:
  DocId: TL_Doc_Id
  MappedSeverity: Severity
  Service: Service
  SearchKeyword: TL_SearchKeyword
  Status: Status
  Tags: Tags
  SearchEngine: Search_Engine
  AlertID: AlertID
  UpdatedOn: TL_UpdatedOn
  TOR_Doc: TL_Doc_Data
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Tor Link Alert ({{KeywordName}})
  alertDescriptionFormat: |
        Source {{TL_SearchEngine}}. Tor URL {{TL_TorUrl}}. Description {{Description}}"
eventGroupingSettings:
  aggregationKind: AlertPerResult
name: Cyble Vision Alerts TOR Links
kind: Scheduled