Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Malware or data exfiltration can cause network data volume anomalies. This query detects such anomalies in volume of bytes traversing a squid proxy. Anomalies require further investigation. Assumes default squid log format.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | Syslog |
| ID | e472c490-4792-4f12-8b6b-6ab3e0404d35 |
| Tactics | CommandAndControl, Exfiltration |
| Techniques | T1071, T1030 |
| Required Connectors | Syslog, SyslogAma |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Selection Criteria | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|---|
Syslog |
ProcessName contains "squid" |
✓ | ✓ | ? |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊