let threshold = 25;
union corelight_conn, corelight_conn_red
| where local_resp == true
| where local_orig == true
| where conn_state in~ ('S0', 'REJ')
| where history !contains 'D'
| summarize count() by id_orig_h, id_resp_p, bin(TimeGenerated, 1m)
| where count_ > threshold
query: |
let threshold = 25;
union corelight_conn, corelight_conn_red
| where local_resp == true
| where local_orig == true
| where conn_state in~ ('S0', 'REJ')
| where history !contains 'D'
| summarize count() by id_orig_h, id_resp_p, bin(TimeGenerated, 1m)
| where count_ > threshold
name: Corelight - Network Service Scanning Multiple IP Addresses
queryPeriod: 1h
id: 599570d4-06f8-4939-8e29-95cd003f1abd
kind: Scheduled
requiredDataConnectors:
- connectorId: Corelight
dataTypes:
- Corelight_v2_conn
- Corelight_v2_conn_red
- corelight_conn
- corelight_conn_red
triggerOperator: gt
queryFrequency: 1h
tactics:
- InitialAccess
triggerThreshold: 0
status: Available
relevantTechniques:
- T1566
version: 2.1.0
description: |
'Identify scanning of services that may be available on the internal network.'
entityMappings:
- entityType: IP
fieldMappings:
- columnName: id_orig_h
identifier: Address
severity: Medium
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Corelight/Analytic Rules/CorelightNetworkServiceScanning.yaml