<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Correlation Rules that detect tor browser in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232346#M8471</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/288393"&gt;@mirtoghrulseyid&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you considered to use the signer as another option using an "or"?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;causality_actor_process_signature_vendor in ("""The Tor Project, Inc.""" )
or actor_process_signature_vendor in ("""The Tor Project, Inc.""" )&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this post answers your question, please mark it as the solution.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Jun 2025 13:46:47 GMT</pubDate>
    <dc:creator>jmazzeo</dc:creator>
    <dc:date>2025-06-23T13:46:47Z</dc:date>
    <item>
      <title>Correlation Rules that detect tor browser</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232343#M8469</link>
      <description>&lt;P data-start="105" data-end="111"&gt;Hello,&lt;/P&gt;
&lt;P data-start="113" data-end="377"&gt;We have decided to create a correlation rule in Cortex XDR to detect employees using the Tor Browser. However, based on our observations, it is possible to access the Tor Browser through a redirect from the Brave application, which is currently not being detected.&lt;/P&gt;
&lt;P data-start="379" data-end="527"&gt;We kindly ask for your assistance in reviewing the correlation rule we’ve created and helping us modify it to include the redirect scenario as well.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dataset = xdr_data
| filter lowercase(action_process_image_name) in ("tor.exe","brave.exe","pluggable-transports.exe","obfs4proxy.exe","tbb-firefox.exe","tor-launcher.exe" )
    or lowercase(action_process_image_path) contains "tor browser" 
| fields agent_hostname,agent_ip_addresses,event_type,event_sub_type,event_id,action_process_image_name,action_process_image_path,agent_hostname, actor_process_image_name,actor_process_command_line,action_process_signature_status,action_process_signature_vendor,event_timestamp&lt;/LI-CODE&gt;
&lt;P data-start="529" data-end="550"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 12:19:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232343#M8469</guid>
      <dc:creator>mirtoghrulseyid</dc:creator>
      <dc:date>2025-06-23T12:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation Rules that detect tor browser</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232346#M8471</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/288393"&gt;@mirtoghrulseyid&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you considered to use the signer as another option using an "or"?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;causality_actor_process_signature_vendor in ("""The Tor Project, Inc.""" )
or actor_process_signature_vendor in ("""The Tor Project, Inc.""" )&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this post answers your question, please mark it as the solution.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 13:46:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232346#M8471</guid>
      <dc:creator>jmazzeo</dc:creator>
      <dc:date>2025-06-23T13:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation Rules that detect tor browser</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232396#M8475</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/288393"&gt;@mirtoghrulseyid&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you're just looking for some enhancements, here's a better query&amp;nbsp;&amp;nbsp;that improves detection of Tor usage&lt;/SPAN&gt;, you may also integrate what what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/310428"&gt;@jmazzeo&lt;/a&gt;&amp;nbsp;has suggested&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;dataset = xdr_data
| filter event_type in (ENUM.PROCESS, ENUM.STORY, ENUM.NETWORK)
  and agent_os_type = ENUM.AGENT_OS_WINDOWS
  and (
    // Direct Tor process execution
    lowercase(action_process_image_name) in ("tor.exe", "tbb-firefox.exe", "pluggable-transports.exe", "obfs4proxy.exe", "tor-launcher.exe")
    or lowercase(action_process_image_path) contains "tor browser"

    or (
      lowercase(actor_process_image_name) = "brave.exe"
      and (
        lowercase(action_process_image_name) in ("tor.exe", "tor-launcher.exe", "obfs4proxy.exe")
        or lowercase(actor_process_command_line) contains "tor"
      )
    )

    or (
      lowercase(actor_process_command_line) contains "tor"
      and (
        lowercase(action_process_image_name) = "brave.exe"
        or lowercase(actor_process_image_name) = "brave.exe"
      )
    )

    or (dns_query_name contains ".onion")
  )
| fields agent_hostname, agent_ip_addresses, event_timestamp,
         actor_process_image_name, actor_process_command_line,
         action_process_image_name, action_process_image_path,
         action_process_signature_status, action_process_signature_vendor,
         dns_query_name, action_remote_ip
| sort desc event_timestamp
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 21:04:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232396#M8475</guid>
      <dc:creator>A.Elzedy</dc:creator>
      <dc:date>2025-06-23T21:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation Rules that detect tor browser</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232397#M8476</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But to detect if users in your environment are communicating with the Tor network, what you really need is a list of Tor exit node IP addresses. There are the IPs that Tor traffic uses to reach the public internet. you can compare your xdr network logs against this list, you’ll be able to spot potential Tor usage regardless of which application was used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can get an up-to-date list of Tor exit nodes from this link:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;A href="https://www.dan.me.uk/torlist/?exit" target="_blank" rel="noopener"&gt;https://www.dan.me.uk/torlist/?exit&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This page gives you a plain text list of IP addresses, one per line. and you may integrate that list as dataset in your XSIAM environment:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the link and download the list.&lt;/LI&gt;
&lt;LI&gt;Save it as a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;.csv&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Open the file and add a header row at the top. Just type:
&lt;PRE&gt;&lt;CODE&gt;tor_ip&lt;/CODE&gt;&lt;/PRE&gt;
This is important because XDR needs a header to recognize the column.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;EM&gt;A quick heads-up: don’t refresh or download from that link too often. The site has rate limits and may block you if you make too many requests in a short time.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once your file is ready, go to your Cortex XSIAM console and upload it:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Settings &amp;gt; Configurations &amp;gt; Data Management &amp;gt; Dataset Management&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;+ Lookup&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Upload your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;.csv&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file&lt;/LI&gt;
&lt;LI&gt;Name the dataset something like&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;&lt;CODE&gt;tor_exit_nodes&lt;BR /&gt;&lt;/CODE&gt;&lt;/CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BR /&gt;Now you’ve got a reusable dataset that you can reference in your XQL queries to detect any communication with known Tor exit nodes&lt;BR /&gt;assuming that you've followed the steps for naming for header and dataset, you may execute this query for the results&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;LI-CODE lang="python"&gt;dataset = xdr_data
| filter event_type = ENUM.NETWORK
| join type = inner (
    dataset = tor_nodes
    | fields tor_ip
  ) as tor_list action_remote_ip = tor_list.tor_ip 
| fields agent_hostname, action_remote_ip, event_timestamp, tor_ip &lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 21:14:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/correlation-rules-that-detect-tor-browser/m-p/1232397#M8476</guid>
      <dc:creator>A.Elzedy</dc:creator>
      <dc:date>2025-06-23T21:14:48Z</dc:date>
    </item>
  </channel>
</rss>

