Potential Exfiltration of Compressed Files
This rule detects potential exfiltration by looking for a few compression extensions in the uri and signs of compression in the mime type, file type, and http body
Sigma rule (View on GitHub)
1title: Potential Exfiltration of Compressed Files
2id: 0d47e3f6-357f-4534-928c-202631d065fa
3status: unsupported
4description: |
5 This rule detects potential exfiltration by looking for a few compression extensions in the uri and signs of compression in the mime type, file type, and http body
6references:
7 - https://github.com/OTRF/detection-hackathon-apt29/issues/17
8author: Greg Howell, OTR (Open Threat Research)
9date: 2020/04/05
10modified: 2023/03/24
11tags:
12 - attack.exfiltration
13 - attack.t1560.001
14 - attack.t1005
15logsource:
16 product: zeek
17 service: http
18detection:
19 selection1:
20 uri|endswith:
21 - '.7z'
22 - '.zip'
23 - '.rar'
24 mime_types|endswith: 'compressed'
25 selection3:
26 filetype|endswith: 'compressed'
27 selection4:
28 http.bodyMagic|endswith: 'compressed'
29 http.method: PUT
30 condition: selection1 or selection3 or selection4
31falsepositives:
32 - Legitimate upload/download of archives
33level: medium
References
Related rules
- AWS EC2 Download Userdata
- High DNS Bytes Out
- High DNS Bytes Out - Firewall
- High DNS Requests Rate
- High DNS Requests Rate - Firewall