QUERIES
ACTIVITY OVERVIEW
this query provides general information on the pcap file
QUERIES > BRIM > ACTIVITY OVERVIEW
count() by _path | sort -rWINDOWS NETWORKING ACTIVITY
this query focuses on Windows networking activity and details the source and destination addresses and named pipe, endpoint and operation detection. the output of this specific query may assist analysts in understanding specific Windows events such as SMB enumeration, logins and service exploitation
QUERIES > BRIM > WINDOWS NETWORKING ACTIVITY
_path matches smb* OR _path=="dce_rpc" | sort -r _pathUNIQUE NETWORK CONNECTIONS & CONNECTION RECEIVED DATA
these two queries provide information on unique connections and connection-data correlation. these two when combined can assist analysts in detecting weird & malicious connections along with suspicious and beaconing activities
#start w/ unique network connections
QUERIES > BRIM > UNIQUE NETWORK CONNECTIONS
_path=="conn" | cut id.orig_h, id.resp_p, id.resp_h | sort|uniq
* uniq list provides a clear list of unique connections that help identify anomalies
#correlate output w/ connection received data
QUERIES > BRIM > CONNECTION RECEIVED DATA
_path=="conn" | put total_bytes := orig_bytes + resp_bytes | sort -r total_bytes | cut uid, id, orig_bytes, resp_bytes, total_bytes
* data list summarises the data transfer rate that supports the anomaly investigation hypothesisUNIQUE DNS QUERIES & HTTP REQUESTS
these two queries when combined can help analysts detect anomalous DNS and HTTP traffic
FILE ACTIVITY
this query helps analysts in detecting possible data leakage attempts and suspicious file activity.
IP SUBNET STATISTICS
this query helps analysts in detecting possible communications outside the scope
SURICATA ALERTS
these queries provide information based on Suricata rule results
Last updated