Skip to content

Commit a7262ec

Browse files
Add Windows Sysmon TOR client execution dataset for T1090.003 (#1123)
--------- Co-authored-by: Nasreddine Bencherchali <nbencher@cisco.com>
1 parent f5cea3c commit a7262ec

2 files changed

Lines changed: 16 additions & 0 deletions

File tree

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
version https://git-lfs.github.com/spec/v1
2+
oid sha256:714e898e11d48bd15038e49e1fdac54081ffab6447c19807a5126ac555c4f1b7
3+
size 1219840
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
author: Vignesh Subramanian, Splunk
2+
id: 59206f25-1c8a-43a8-878e-a0f5c8aed211
3+
date: '2026-01-19'
4+
description: 'Generated dataset of Windows Sysmon process creation logs (Event ID 1) capturing TOR browser and related TOR component activities on Windows endpoints. Insider threats and external attackers may use TOR to hide their activity and bypass network security controls. This dataset helps detect the presence and execution of TOR components on Windows systems.'
5+
environment: manual simulations in a controlled lab environment
6+
directory: windows_tor_client_execution
7+
mitre_technique:
8+
- T1090.003
9+
datasets:
10+
- name: windows-sysmon
11+
path: /datasets/attack_techniques/T1090.003/windows_tor_client_execution/windows-sysmon.log
12+
sourcetype: XmlWinEventLog
13+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

0 commit comments

Comments
 (0)