Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts TOR Links

Back
Idb9df1ec4-a572-4448-8da1-1bc4b7e1687f
RulenameCyble Vision Alerts TOR Links
DescriptionDetects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.
SeverityLow
TacticsResourceDevelopment
Reconnaissance
TechniquesT1583
T1590
T1595
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
Version1.0.0
Arm templateb9df1ec4-a572-4448-8da1-1bc4b7e1687f.json
Deploy To Azure
Alerts_tor_links 
| where Service == "tor_links" 
| extend MappedSeverity = Severity
relevantTechniques:
- T1583
- T1590
- T1595
entityMappings:
- entityType: URL
  fieldMappings:
  - columnName: TL_TorUrl
    identifier: Url
- entityType: DNS
  fieldMappings:
  - columnName: Domain
    identifier: DomainName
- entityType: IP
  fieldMappings:
  - columnName: IP
    identifier: Address
eventGroupingSettings:
  aggregationKind: AlertPerResult
version: 1.0.0
query: |
  Alerts_tor_links 
  | where Service == "tor_links" 
  | extend MappedSeverity = Severity  
id: b9df1ec4-a572-4448-8da1-1bc4b7e1687f
suppressionDuration: PT5H
severity: Low
kind: Scheduled
queryFrequency: 30m
description: |
    'Detects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
subTechniques: []
triggerOperator: GreaterThan
name: Cyble Vision Alerts TOR Links
tactics:
- ResourceDevelopment
- Reconnaissance
alertDetailsOverride:
  alertDescriptionFormat: |
        Source {{TL_SearchEngine}}. Tor URL {{TL_TorUrl}}. Description {{Description}}"
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Tor Link Alert ({{KeywordName}})
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
triggerThreshold: 0
queryPeriod: 30m
enabled: true
status: Available
customDetails:
  Tags: Tags
  SearchKeyword: TL_SearchKeyword
  DocId: TL_Doc_Id
  UpdatedOn: TL_UpdatedOn
  SearchEngine: Search_Engine
  Status: Status
  Service: Service
  MappedSeverity: Severity
  AlertID: AlertID
  TOR_Doc: TL_Doc_Data
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities