Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts TOR Links

Back
Idb9df1ec4-a572-4448-8da1-1bc4b7e1687f
RulenameCyble Vision Alerts TOR Links
DescriptionDetects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.
SeverityLow
TacticsResourceDevelopment
Reconnaissance
TechniquesT1583
T1590
T1595
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
Version1.0.0
Arm templateb9df1ec4-a572-4448-8da1-1bc4b7e1687f.json
Deploy To Azure
Alerts_tor_links 
| where Service == "tor_links" 
| extend MappedSeverity = Severity
customDetails:
  Status: Status
  AlertID: AlertID
  TOR_Doc: TL_Doc_Data
  SearchEngine: Search_Engine
  DocId: TL_Doc_Id
  Tags: Tags
  Service: Service
  SearchKeyword: TL_SearchKeyword
  UpdatedOn: TL_UpdatedOn
  MappedSeverity: Severity
kind: Scheduled
severity: Low
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
description: |
    'Detects Tor marketplace, darkweb link, and onion domain alerts from CybleVision. Uses the Alerts_TorLinks parser to extract onion URLs, search engines, search keywords, content, and identifiers. Incidents are grouped by service.'
triggerOperator: GreaterThan
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Tor Link Alert ({{KeywordName}})
  alertDescriptionFormat: |
        Source {{TL_SearchEngine}}. Tor URL {{TL_TorUrl}}. Description {{Description}}"
status: Available
enabled: true
query: |
  Alerts_tor_links 
  | where Service == "tor_links" 
  | extend MappedSeverity = Severity  
triggerThreshold: 0
relevantTechniques:
- T1583
- T1590
- T1595
version: 1.0.0
queryFrequency: 30m
subTechniques: []
suppressionDuration: PT5H
queryPeriod: 30m
tactics:
- ResourceDevelopment
- Reconnaissance
name: Cyble Vision Alerts TOR Links
id: b9df1ec4-a572-4448-8da1-1bc4b7e1687f
eventGroupingSettings:
  aggregationKind: AlertPerResult
entityMappings:
- fieldMappings:
  - identifier: Url
    columnName: TL_TorUrl
  entityType: URL
- fieldMappings:
  - identifier: DomainName
    columnName: Domain
  entityType: DNS
- fieldMappings:
  - identifier: Address
    columnName: IP
  entityType: IP
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_TOR_Links.yaml
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    reopenClosedIncident: false
    lookbackDuration: PT5H