let f_cnt_upload_threshold = 5;
let f_upload_size_threshold = 5000000;
CiscoWSAEvent
| where HttpRequestMethod in~ ('POST', 'PUT')
| where isnotempty(AmpFileName)
| where UrlCategory in~ ('IW_fts', 'IW_osb')
| where DstBytes > f_upload_size_threshold
| summarize count() by AmpFileName, SrcUserName, bin(TimeGenerated, 10m)
| where count_ >= f_cnt_upload_threshold
| extend AccountCustomEntity = SrcUserName
relevantTechniques:
- T1567
name: Cisco WSA - Unexpected uploads
triggerThreshold: 0
tactics:
- Exfiltration
severity: High
id: 32c460ad-2d40-43e9-8ead-5cdd1d7a3163
status: Available
requiredDataConnectors:
- datatypes:
- Syslog
connectorId: SyslogAma
kind: Scheduled
query: |
let f_cnt_upload_threshold = 5;
let f_upload_size_threshold = 5000000;
CiscoWSAEvent
| where HttpRequestMethod in~ ('POST', 'PUT')
| where isnotempty(AmpFileName)
| where UrlCategory in~ ('IW_fts', 'IW_osb')
| where DstBytes > f_upload_size_threshold
| summarize count() by AmpFileName, SrcUserName, bin(TimeGenerated, 10m)
| where count_ >= f_cnt_upload_threshold
| extend AccountCustomEntity = SrcUserName
description: |
'Detects unexpected file uploads.'
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CiscoWSA/Analytic Rules/CiscoWSADataExfiltration.yaml
triggerOperator: gt
queryPeriod: 1h
queryFrequency: 1h
version: 1.0.3
entityMappings:
- entityType: Account
fieldMappings:
- columnName: AccountCustomEntity
identifier: Name