Silk Typhoon Suspicious Exchange Request

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query looks for suspicious request patterns to Exchange servers that fit a pattern observed by Silk Typhoon actors. The same query can be run on HTTPProxy logs from on-premise hosted Exchange servers. Reference: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID 23005e87-2d3a-482b-b03d-edbebd1ae151
Severity Medium
Kind Scheduled
Tactics InitialAccess
Techniques T1190
Required Connectors AzureMonitor(IIS)
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
W3CIISLog ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
ESI-Opt5ExchangeIISLogs Microsoft Exchange Security - Exchange On-Premises

Solutions: Microsoft Exchange Security - Exchange On-Premises


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules