Skip to content

Conversation

@vignesh-user
Copy link

This pull request adds a new Windows Sysmon dataset mapped to MITRE ATT&CK technique T1090.003 (Multi-hop Proxy).

The dataset contains Sysmon Process Creation events (Event ID 1) capturing execution of TOR Browser and related TOR components on Windows endpoints.

Data was generated through manual simulations in a controlled lab environment and is intended to help security teams detect the presence and execution of TOR components using endpoint telemetry.

Once this dataset is merged, I will use it as a test dataset to create a new Splunk ESCU detection called "Windows TOR Client Execution Detected" in the security_content GitHub repository.

If you need any further information, Please reach out to me via Slack (Vignesh Subramanian)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant