Nylon Typhoon Command Line Activity November 2021

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query hunts for Nylon Typhoon-related activity, specifically data collection and staging. It looks for use of tools like xcopy and renamed archiving tools on hosts with observed signatures.

Attribute Value
Type Hunting Query
Solution Legacy IOC based Threat Protection
ID bb30abbc-9af6-4a37-9536-e9207e023989
Tactics Collection
Techniques T1074.001
Required Connectors MicrosoftDefenderAdvancedThreatProtection, MicrosoftThreatProtection, WindowsSecurityEvents, WindowsForwardedEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceProcessEvents ?
SecurityAlert ?
SecurityEvent ?
WindowsEvent ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Legacy IOC based Threat Protection