Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts TOR Links

Back
Idb9df1ec4-a572-4448-8da1-1bc4b7e1687f
RulenameCyble Vision Alerts TOR Links
DescriptionDetects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.
SeverityLow
TacticsResourceDevelopment
Reconnaissance
TechniquesT1583
T1590
T1595
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
Version1.0.0
Arm templateb9df1ec4-a572-4448-8da1-1bc4b7e1687f.json
Deploy To Azure
Alerts_tor_links 
| where Service == "tor_links" 
| extend MappedSeverity = Severity
name: Cyble Vision Alerts TOR Links
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Tor Link Alert ({{KeywordName}})
  alertDescriptionFormat: |
        Source {{TL_SearchEngine}}. Tor URL {{TL_TorUrl}}. Description {{Description}}"
query: |
  Alerts_tor_links 
  | where Service == "tor_links" 
  | extend MappedSeverity = Severity  
id: b9df1ec4-a572-4448-8da1-1bc4b7e1687f
enabled: true
entityMappings:
- fieldMappings:
  - columnName: TL_TorUrl
    identifier: Url
  entityType: URL
- fieldMappings:
  - columnName: Domain
    identifier: DomainName
  entityType: DNS
- fieldMappings:
  - columnName: IP
    identifier: Address
  entityType: IP
version: 1.0.0
triggerOperator: GreaterThan
suppressionDuration: PT5H
description: |
    'Detects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.'
kind: Scheduled
queryFrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
subTechniques: []
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  SearchKeyword: TL_SearchKeyword
  AlertID: AlertID
  SearchEngine: Search_Engine
  Tags: Tags
  UpdatedOn: TL_UpdatedOn
  Service: Service
  TOR_Doc: TL_Doc_Data
  Status: Status
  DocId: TL_Doc_Id
  MappedSeverity: Severity
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1583
- T1590
- T1595
tactics:
- ResourceDevelopment
- Reconnaissance