<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Toutrial: Detecting Tor Traffic in XSIAM in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/toutrial-detecting-tor-traffic-in-xsiam/m-p/1232764#M8492</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190764"&gt;@eluis&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jun 2025 10:33:38 GMT</pubDate>
    <dc:creator>A.Elzedy</dc:creator>
    <dc:date>2025-06-27T10:33:38Z</dc:date>
    <item>
      <title>Toutrial: Detecting Tor Traffic in XSIAM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/toutrial-detecting-tor-traffic-in-xsiam/m-p/1232598#M8488</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Everyone,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Some members in the community have recently been exploring ways to detect Tor traffic within their environments. I’ve spent some time working on a solution to this challenge, and I wanted to turn that work into a dedicated post so more people can benefit from it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Why This Matters ?&lt;/H3&gt;
&lt;P&gt;Detecting communication with Tor exit nodes gives your team visibility into potentially suspicious behavior, regardless of the application or protocol used.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Step 1: Use a Reliable Exit Node Source&lt;/H3&gt;
&lt;P&gt;Instead of relying on rate-limited or unstable feeds, I recommend using this curated and regularly updated list:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://firewalliplists.gypthecat.com/lists/kusto/kusto-tor-exit.csv.zip" target="_blank"&gt;https://firewalliplists.gypthecat.com/lists/kusto/kusto-tor-exit.csv.zip&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Download and extract the ZIP file.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The CSV file already includes a header named&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;IPAddress&lt;/CODE&gt;, which is required for XSIAM ingestion.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Step 2: Upload the Dataset to Cortex XSIAM&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Go to&lt;BR /&gt;&lt;CODE&gt;Settings &amp;gt; Configurations &amp;gt; Data Management &amp;gt; Dataset Management&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;+ Lookup&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Upload the CSV file&lt;/LI&gt;
&lt;LI&gt;Name the dataset something clear, like&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;tor_nodes&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This creates a reusable dataset that can be referenced in your detection logic.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Step 3: Run the Detection Query&lt;/H3&gt;
&lt;P&gt;Use the following XQL query to identify any network events involving known Tor exit nodes:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dataset = xdr_data
| filter event_type = ENUM.NETWORK
| join type = inner (
    dataset = tor_nodes
    | fields IPAddress
  ) as tor_list action_remote_ip = tor_list.IPAddress 
| fields agent_hostname, action_remote_ip, event_timestamp, IPAddress
&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;This method has already helped a few teams gain better visibility into anonymized traffic, and I hope it proves just as useful for others here. If you have feedback, enhancements, or alternative approaches, I’d genuinely appreciate hearing them.&lt;BR /&gt;&lt;BR /&gt;The strength of this community lies in our willingness to share, challenge, and refine ideas together.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 19:20:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/toutrial-detecting-tor-traffic-in-xsiam/m-p/1232598#M8488</guid>
      <dc:creator>A.Elzedy</dc:creator>
      <dc:date>2025-06-25T19:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Toutrial: Detecting Tor Traffic in XSIAM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/toutrial-detecting-tor-traffic-in-xsiam/m-p/1232691#M8491</link>
      <description>&lt;P&gt;Hi A.Elzedy,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Very good tutorial and topic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;KR,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Luis&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2025 16:56:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/toutrial-detecting-tor-traffic-in-xsiam/m-p/1232691#M8491</guid>
      <dc:creator>eluis</dc:creator>
      <dc:date>2025-06-26T16:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Toutrial: Detecting Tor Traffic in XSIAM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/toutrial-detecting-tor-traffic-in-xsiam/m-p/1232764#M8492</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190764"&gt;@eluis&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 10:33:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/toutrial-detecting-tor-traffic-in-xsiam/m-p/1232764#M8492</guid>
      <dc:creator>A.Elzedy</dc:creator>
      <dc:date>2025-06-27T10:33:38Z</dc:date>
    </item>
  </channel>
</rss>

