Skip to content

Commit 74a9fb0

Browse files
authored
Apply suggestions from code review
1 parent dec0fd6 commit 74a9fb0

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

datasets/attack_techniques/T1090.003/windows_tor_client_execution/windows_tor_client_execution.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
author: Vignesh Subramanian, Splunk
2-
id:
2+
id: 59206f25-1c8a-43a8-878e-a0f5c8aed211
33
date: '2026-01-19'
44
description: 'Generated dataset of Windows Sysmon process creation logs (Event ID 1) capturing TOR browser and related TOR component activities on Windows endpoints. Insider threats and external attackers may use TOR to hide their activity and bypass network security controls. This dataset helps detect the presence and execution of TOR components on Windows systems.'
55
environment: manual simulations in a controlled lab environment

0 commit comments

Comments
 (0)