Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

SlackAudit - Suspicious file downloaded

Back
Id132b98a5-07e9-401a-9b6f-453e52a53979
RulenameSlackAudit - Suspicious file downloaded.
DescriptionDetects potentialy suspicious downloads.
SeverityMedium
TacticsInitialAccess
TechniquesT1189
Required data connectorsSlackAuditAPI
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SlackAudit/Analytic Rules/SlackAuditSuspiciousFileDownloaded.yaml
Version1.0.0
Arm template132b98a5-07e9-401a-9b6f-453e52a53979.json
Deploy To Azure
SlackAudit
| where DvcAction =~ 'file_downloaded'
| extend fe = split(EntityFileName, '.')
| where array_length(fe) > 2
| where fe[1] matches regex @"\D+"
| where strlen(fe[1]) < 5
| project EntityFileName, SrcUserName
| extend AccountCustomEntity = SrcUserName
| extend FileCustomEntity = EntityFileName
triggerThreshold: 0
entityMappings:
- fieldMappings:
  - identifier: FullName
    columnName: AccountCustomEntity
  entityType: Account
- fieldMappings:
  - identifier: Name
    columnName: FileCustomEntity
  entityType: File
requiredDataConnectors:
- connectorId: SlackAuditAPI
  dataTypes:
  - SlackAudit_CL
id: 132b98a5-07e9-401a-9b6f-453e52a53979
severity: Medium
query: |
  SlackAudit
  | where DvcAction =~ 'file_downloaded'
  | extend fe = split(EntityFileName, '.')
  | where array_length(fe) > 2
  | where fe[1] matches regex @"\D+"
  | where strlen(fe[1]) < 5
  | project EntityFileName, SrcUserName
  | extend AccountCustomEntity = SrcUserName
  | extend FileCustomEntity = EntityFileName  
relevantTechniques:
- T1189
queryFrequency: 1h
version: 1.0.0
triggerOperator: gt
name: SlackAudit - Suspicious file downloaded.
description: |
    'Detects potentialy suspicious downloads.'
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SlackAudit/Analytic Rules/SlackAuditSuspiciousFileDownloaded.yaml
queryPeriod: 1h
tactics:
- InitialAccess
kind: Scheduled
status: Available