let threshold = 25;
corelight_http
| where method in~ ('POST', 'PUT')
| where isempty(referrer)
| where orig_mime_types has_any ('application/vnd.ms-cab-compressed', 'application/warc', 'application/x-7z-compressed', 'application/x-ace', 'application/x-arc', 'application/x-archive', 'application/x-arj', 'application/x-compress', 'application/x-cpio', 'application/x-dmg', 'application/x-eet', 'application/x-gzip', 'application/x-lha', 'application/x-lrzip', 'application/x-lz4', 'application/x-lzma', 'application/x-lzh', 'application/x-lzip', 'application/x-rar', 'application/x-rpm', 'application/x-stuffit', 'application/x-tar', 'application/x-xz', 'application/x-zoo', 'application/zip')
| summarize count() by uri, id_orig_h, bin(TimeGenerated, 15m)
| where count_ > threshold
name: Corelight - Multiple Compressed Files Transferred over HTTP
relevantTechniques:
- T1567
id: 4e55e306-3022-43a1-870a-41c4d5116079
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Corelight/Analytic Rules/CorelightMultipleCompressedFilesTransferredOverHTTP.yaml
requiredDataConnectors:
- dataTypes:
- Corelight_v2_http
- corelight_http
connectorId: Corelight
version: 2.1.1
severity: Medium
triggerThreshold: 0
queryPeriod: 1h
entityMappings:
- fieldMappings:
- identifier: Address
columnName: id_orig_h
entityType: IP
queryFrequency: 1h
status: Available
query: |
let threshold = 25;
corelight_http
| where method in~ ('POST', 'PUT')
| where isempty(referrer)
| where orig_mime_types has_any ('application/vnd.ms-cab-compressed', 'application/warc', 'application/x-7z-compressed', 'application/x-ace', 'application/x-arc', 'application/x-archive', 'application/x-arj', 'application/x-compress', 'application/x-cpio', 'application/x-dmg', 'application/x-eet', 'application/x-gzip', 'application/x-lha', 'application/x-lrzip', 'application/x-lz4', 'application/x-lzma', 'application/x-lzh', 'application/x-lzip', 'application/x-rar', 'application/x-rpm', 'application/x-stuffit', 'application/x-tar', 'application/x-xz', 'application/x-zoo', 'application/zip')
| summarize count() by uri, id_orig_h, bin(TimeGenerated, 15m)
| where count_ > threshold
tactics:
- Exfiltration
kind: Scheduled
description: |
'Detects compressed archives transferre over HTTP.'
triggerOperator: gt