let threshold = 25;
union corelight_conn, corelight_conn_red
| where local_resp == true
| where local_orig == true
| where conn_state in~ ('S0', 'REJ')
| where history !contains 'D'
| summarize count() by id_orig_h, id_resp_p, bin(TimeGenerated, 1m)
| where count_ > threshold
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Corelight/Analytic Rules/CorelightNetworkServiceScanning.yaml
severity: Medium
queryFrequency: 1h
status: Available
entityMappings:
- fieldMappings:
- identifier: Address
columnName: id_orig_h
entityType: IP
triggerOperator: gt
query: |
let threshold = 25;
union corelight_conn, corelight_conn_red
| where local_resp == true
| where local_orig == true
| where conn_state in~ ('S0', 'REJ')
| where history !contains 'D'
| summarize count() by id_orig_h, id_resp_p, bin(TimeGenerated, 1m)
| where count_ > threshold
queryPeriod: 1h
kind: Scheduled
id: 599570d4-06f8-4939-8e29-95cd003f1abd
relevantTechniques:
- T1566
description: |
'Identify scanning of services that may be available on the internal network.'
requiredDataConnectors:
- dataTypes:
- Corelight_v2_conn
- Corelight_v2_conn_red
- corelight_conn
- corelight_conn_red
connectorId: Corelight
triggerThreshold: 0
tactics:
- InitialAccess
name: Corelight - Network Service Scanning Multiple IP Addresses
version: 2.1.0