let threshold = 10;
SlackAudit
| where DvcAction =~ 'file_uploaded'
| extend FE = extract(@'.*\.(.*)$', 1, EntityFileName)
| where FE in~ ('tar', 'bz2', 'gz', 'tgz', 'Z', 'tbz2', 'zst', 'zip', 'zipx', '7z', 'rar', 'sfx')
| summarize count() by SrcUserName, bucket = bin(TimeGenerated, 15m)
| where count_ > threshold
| extend AccountCustomEntity = SrcUserName
query: |
let threshold = 10;
SlackAudit
| where DvcAction =~ 'file_uploaded'
| extend FE = extract(@'.*\.(.*)$', 1, EntityFileName)
| where FE in~ ('tar', 'bz2', 'gz', 'tgz', 'Z', 'tbz2', 'zst', 'zip', 'zipx', '7z', 'rar', 'sfx')
| summarize count() by SrcUserName, bucket = bin(TimeGenerated, 15m)
| where count_ > threshold
| extend AccountCustomEntity = SrcUserName
triggerThreshold: 0
status: Available
version: 1.0.0
requiredDataConnectors:
- dataTypes:
- SlackAudit_CL
connectorId: SlackAuditAPI
relevantTechniques:
- T1567
queryFrequency: 1d
triggerOperator: gt
kind: Scheduled
entityMappings:
- entityType: Account
fieldMappings:
- identifier: FullName
columnName: AccountCustomEntity
description: |
'This query helps to detect when a user uploads multiple archived files in short period of time.'
severity: Low
tactics:
- Exfiltration
name: SlackAudit - Multiple archived files uploaded in short period of time
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SlackAudit/Analytic Rules/SlackAuditMultipleArchivedFilesUploadedInShortTimePeriod.yaml
id: 3db0cb83-5fa4-4310-a8a0-d8d66183f0bd
queryPeriod: 1d