MATCH-S00574 |
.NET Framework Remote Code Execution Vulnerability |
MATCH-S00458 |
ADPassHunt Tool |
MATCH-S00307 |
AWS - Excessive OAuth Application Permissions Scope |
MATCH-S00306 |
AWS - New UserPoolClient Created |
MATCH-S00922 |
AWS Bedrock Agent Created |
MATCH-S00924 |
AWS Bedrock Guardrail Deleted |
MATCH-S00923 |
AWS Bedrock Model Invocation Denied for User |
MATCH-S00921 |
AWS Bedrock Model Invocation Logging Configuration Change Observed |
MATCH-S00715 |
AWS Cloud Storage Deletion |
AGGREGATION-S00002 |
AWS CloudTrail - Aggressive Reconnaissance |
LEGACY-S00207 |
AWS CloudTrail - Customer Master Key Disabled or Scheduled for Deletion |
MATCH-S00261 |
AWS CloudTrail - Database Snapshot Created |
MATCH-S00208 |
AWS CloudTrail - EC2 Access Key Action Detected |
MATCH-S00246 |
AWS CloudTrail - GetSecretValue from non Amazon IP |
MATCH-S00111 |
AWS CloudTrail - IAM CreateUser Action Observed |
LEGACY-S00206 |
AWS CloudTrail - IAM Policy Applied |
MATCH-S00101 |
AWS CloudTrail - IAM Privileged Policy Applied to Group |
MATCH-S00102 |
AWS CloudTrail - IAM Privileged Policy Applied to Group (Username) |
MATCH-S00104 |
AWS CloudTrail - IAM Privileged Policy Applied to Role |
MATCH-S00099 |
AWS CloudTrail - IAM Privileged Policy Applied to User |
THRESHOLD-S00051 |
AWS CloudTrail - IAM User Generating AccessDenied Errors Across Multiple Actions |
MATCH-S00113 |
AWS CloudTrail - Logging Configuration Change Observed |
MATCH-S00308 |
AWS CloudTrail - OpsWorks Describe Permissions Event |
MATCH-S00109 |
AWS CloudTrail - Permissions Boundary Lifted |
MATCH-S00105 |
AWS CloudTrail - Public S3 Bucket Exposed |
MATCH-S00213 |
AWS CloudTrail - Reconnaissance related event |
MATCH-S00096 |
AWS CloudTrail - Root Console Successful Login Observed |
MATCH-S00764 |
AWS CloudTrail - S3 Bucket Public Access Block Disabled |
MATCH-S00210 |
AWS CloudTrail - SQS List Queues Event |
MATCH-S00240 |
AWS CloudTrail - ScheduleKeyDeletion in KMS |
MATCH-S00247 |
AWS CloudTrail - Secrets Manager sensitive admin action observed |
MATCH-S00238 |
AWS CloudTrail - sensitive activity in KMS |
MATCH-S00540 |
AWS CloudTrail Network Access Control List Deleted |
MATCH-S00664 |
AWS CloudWatch Alarm Actions Disabled |
MATCH-S00663 |
AWS CloudWatch Alarm Deletion |
MATCH-S00662 |
AWS CloudWatch Anomaly Detector Deletion |
MATCH-S00665 |
AWS CloudWatch Log Group Deletion |
MATCH-S00661 |
AWS CloudWatch Log Stream Deletion |
MATCH-S00671 |
AWS Config Recorder Deletion |
MATCH-S00672 |
AWS Config Recorder Stopped |
MATCH-S00670 |
AWS Config Service Tampering |
OUTLIER-S00024 |
AWS DynamoDB Outlier in GetItem Events from User |
MATCH-S00654 |
AWS ECS Cluster Deleted |
MATCH-S00873 |
AWS EKS Cluster Configuration Updated |
MATCH-S00872 |
AWS EKS Failed Curl Authentication Attempt |
MATCH-S00871 |
AWS EKS Pod Shared Object Modification or Creation |
MATCH-S00870 |
AWS EKS Secrets Created |
MATCH-S00869 |
AWS EKS Secrets Deleted |
MATCH-S00716 |
AWS Image Creation |
MATCH-S00717 |
AWS Image Deletion |
THRESHOLD-S00106 |
AWS Image Discovery |
MATCH-S00718 |
AWS Image Modification |
MATCH-S00719 |
AWS Instance Creation |
MATCH-S00720 |
AWS Instance Deletion |
THRESHOLD-S00107 |
AWS Instance Discovery |
MATCH-S00721 |
AWS Instance Modification |
MATCH-S00874 |
AWS Lambda Function Recon |
MATCH-S00679 |
AWS Route 53 Domain Registered |
THRESHOLD-S00093 |
AWS Route 53 Reconnaissance |
MATCH-S00677 |
AWS Route 53 Service Tampering |
MATCH-S00680 |
AWS Route 53 TestDNSAnswer |
MATCH-S00678 |
AWS Route 53 Traffic Policy Creation |
OUTLIER-S00025 |
AWS S3 Outlier in PutObject Denied Events |
MATCH-S00825 |
AWS Secrets Manager Enumeration |
MATCH-S00875 |
AWS VPC FLow Log Deletion |
MATCH-S00674 |
AWS WAF Access Control List Updated |
THRESHOLD-S00092 |
AWS WAF Reconnaissance |
MATCH-S00676 |
AWS WAF Rule Group Updated |
MATCH-S00675 |
AWS WAF Rule Updated |
MATCH-S00673 |
AWS WAF Service Tampering |
MATCH-S00814 |
Abnormal Child Process - sdiagnhost.exe - CVE-2022-30190 |
MATCH-S00139 |
Abnormal Parent-Child Process Combination |
MATCH-S00511 |
Accessibility Executables Replaced |
THRESHOLD-S00062 |
Active Directory Domain Enumeration |
LEGACY-S00067 |
Administrator Login via RDP |
MATCH-S00600 |
Alibaba ActionTrail Access Key Action Detected |
MATCH-S00601 |
Alibaba ActionTrail IAM CreateUser Observed |
MATCH-S00594 |
Alibaba ActionTrail KMS Activity |
MATCH-S00597 |
Alibaba ActionTrail Key Deleted or Disabled |
MATCH-S00593 |
Alibaba ActionTrail ListQueues |
MATCH-S00598 |
Alibaba ActionTrail Logging Configuration Change Observed |
MATCH-S00589 |
Alibaba ActionTrail Network Access Control List Deleted |
MATCH-S00599 |
Alibaba ActionTrail Root Login |
MATCH-S00596 |
Alibaba ActionTrail Secrets Manager Activity |
THRESHOLD-S00608 |
Alibaba ActionTrail Unauthorized API Calls |
MATCH-S00553 |
Allowed Inbound RDP Traffic |
THRESHOLD-S00003 |
Amazon VPC - Network Scan |
THRESHOLD-S00004 |
Amazon VPC - Port Scan |
MATCH-S00660 |
Anomalous AWS User Executed a Command on ECS Container |
MATCH-S00516 |
Antivirus Ransomware Detection |
MATCH-S00510 |
Attempt to Add Certificate to Store |
MATCH-S00415 |
Attempt to Clear Windows Event Logs Using Wevtutil |
MATCH-S00390 |
Attempted Credential Dump From Registry Via Reg.Exe |
MATCH-S00417 |
Attrib.exe use to Hide Files and Folders |
MATCH-S00215 |
Auth0 - High Risk Event |
MATCH-S00685 |
Authentication Without MFA |
CHAIN-S00018 |
Autorun file created after USB disk mount on host |
MATCH-S00564 |
Azorult Malware Registry Key |
MATCH-S00226 |
Azure - Add Member to Group |
MATCH-S00220 |
Azure - Add Member to Role Outside of PIM |
MATCH-S00798 |
Azure - Anonymous Blob Access |
MATCH-S00805 |
Azure - Bastion Host Created/Modified |
MATCH-S00806 |
Azure - Bastion Host Deleted |
MATCH-S00785 |
Azure - Blob Container Deletion |
MATCH-S00808 |
Azure - Container Instance Creation/Modification |
MATCH-S00809 |
Azure - Container Start |
MATCH-S00235 |
Azure - Create User |
MATCH-S00795 |
Azure - Diagnostic Setting Deleted |
MATCH-S00796 |
Azure - Diagnostic Setting Modified |
MATCH-S00797 |
Azure - Event Hub Deleted |
THRESHOLD-S00109 |
Azure - Excessive Key Vault Get Requests |
MATCH-S00260 |
Azure - External User Invitation Redeemed |
MATCH-S00256 |
Azure - External User Invited |
MATCH-S00254 |
Azure - Group Information Downloaded |
MATCH-S00243 |
Azure - High Risk Sign-In (Aggregate) |
MATCH-S00245 |
Azure - High Risk Sign-In (Real Time) |
MATCH-S00807 |
Azure - Image Created/Modified |
MATCH-S00810 |
Azure - Image Deleted |
MATCH-S00788 |
Azure - Key Deletion |
MATCH-S00789 |
Azure - Key Purged |
MATCH-S00792 |
Azure - Key Vault Deleted |
MATCH-S00231 |
Azure - Member Added to Global Administrator Role |
MATCH-S00233 |
Azure - Member Added to Global Administrator Role Non-PIM |
MATCH-S00229 |
Azure - Member Added to Non-Global Administrator Role |
MATCH-S00140 |
Azure - Policy Added |
MATCH-S00142 |
Azure - Policy Deleted |
MATCH-S00144 |
Azure - Policy Updated |
MATCH-S00787 |
Azure - Protected Item Deletion Attempt |
MATCH-S00224 |
Azure - Risky User State : User Confirmed Compromised |
MATCH-S00786 |
Azure - SQL Database Export |
MATCH-S00794 |
Azure - Secret Backup |
MATCH-S00791 |
Azure - Secret Deleted |
MATCH-S00790 |
Azure - Secret Purged |
MATCH-S00800 |
Azure - Storage Deletion |
MATCH-S00799 |
Azure - Storage Modification |
MATCH-S00250 |
Azure - Suspicious User Risk State Associated with Login |
MATCH-S00303 |
Azure - Unauthorized OAuth Application |
MATCH-S00252 |
Azure - User Information Downloaded |
MATCH-S00803 |
Azure - Virtual Machine Creation/Modification |
MATCH-S00804 |
Azure - Virtual Machine Deleted |
MATCH-S00801 |
Azure - Virtual Machine Started |
MATCH-S00802 |
Azure - Virtual Machine Stopped |
MATCH-S00838 |
Azure Active Directory Authentication Method Changed |
MATCH-S00896 |
Azure Authentication Policy Change |
MATCH-S00836 |
Azure Conditional Access Policy Disabled |
MATCH-S00864 |
Azure Firewall Rule Modified |
MATCH-S00891 |
Azure OAUTH Application Consent from User |
MATCH-S00818 |
Azure PRT Token Issued via Non Interactive Login |
MATCH-S00839 |
Azure Virtual Machine RunCommand Issued |
MATCH-S00708 |
AzureDevOps - Project Visibility Changed to Public |
MATCH-S00486 |
Backdoor.HTTP.BEACON.[CSBundle CDN GET] |
MATCH-S00485 |
Backdoor.HTTP.BEACON.[CSBundle MSOffice GET] |
MATCH-S00484 |
Backdoor.HTTP.BEACON.[CSBundle MSOffice POST] |
MATCH-S00490 |
Backdoor.HTTP.BEACON.[CSBundle NYTIMES GET] |
MATCH-S00496 |
Backdoor.HTTP.BEACON.[CSBundle NYTIMES Server] |
MATCH-S00495 |
Backdoor.HTTP.BEACON.[CSBundle Original GET] |
MATCH-S00489 |
Backdoor.HTTP.BEACON.[CSBundle Original POST] |
MATCH-S00491 |
Backdoor.HTTP.BEACON.[CSBundle Original Stager] |
MATCH-S00488 |
Backdoor.HTTP.BEACON.[CSBundle USAToday GET] |
MATCH-S00487 |
Backdoor.HTTP.BEACON.[CSBundle USAToday Server] |
MATCH-S00474 |
Backdoor.HTTP.BEACON.[Yelp GET] |
MATCH-S00494 |
Backdoor.HTTP.BEACON.[Yelp Request] |
MATCH-S00497 |
Backdoor.HTTP.GORAT.[POST] |
MATCH-S00492 |
Backdoor.HTTP.GORAT.[SID1] |
MATCH-S00493 |
Backdoor.SSL.BEACON.[CSBundle Ajax] |
LEGACY-S00003 |
Base32 in DNS Query |
MATCH-S00686 |
Base64 Decode in Command Line |
MATCH-S00688 |
Bash History Tampering |
MATCH-S00541 |
Batch File Write To System32 |
LEGACY-S00004 |
Bitsadmin to Uncommon TLD |
LEGACY-S00006 |
Blocked Email Host |
LEGACY-S00007 |
Blocked Email Message |
MATCH-S00373 |
BlueMashroom DLL Load |
LEGACY-S00009 |
Bluecoat Proxy - Suspicious or Malicious Categories |
LEGACY-S00010 |
Browser Exploitation Framework (BeEF) Hook |
THRESHOLD-S00096 |
Brute Force Attempt |
MATCH-S00388 |
COMPlus_ETWEnabled Command Line Arguments |
MATCH-S00727 |
CPL File Executed from Temp Directory |
MATCH-S00209 |
CVE-2021-44228 Log4j2 Java Library 0-Day Attempt |
CHAIN-S00017 |
Change of Azure MFA Method followed by Risky SignIn |
MATCH-S00821 |
Chromium Browser History Access by Non-Browser Process |
MATCH-S00819 |
Chromium Process Started With Debugging Port |
MATCH-S00074 |
Cisco Stealthwatch Template Alerts |
LEGACY-S00190 |
Cisco Umbrella - DNS Request Category: Adware |
LEGACY-S00191 |
Cisco Umbrella - DNS Request Category: Command and Control |
LEGACY-S00192 |
Cisco Umbrella - DNS Request Category: Cryptomining |
LEGACY-S00193 |
Cisco Umbrella - DNS Request Category: DNS Tunneling VPN |
LEGACY-S00194 |
Cisco Umbrella - DNS Request Category: Dynamic DNS |
LEGACY-S00195 |
Cisco Umbrella - DNS Request Category: Hacking |
LEGACY-S00196 |
Cisco Umbrella - DNS Request Category: Malware |
LEGACY-S00197 |
Cisco Umbrella - DNS Request Category: Newly Seen Domains |
LEGACY-S00198 |
Cisco Umbrella - DNS Request Category: P2P/File sharing |
LEGACY-S00199 |
Cisco Umbrella - DNS Request Category: Personal VPN |
LEGACY-S00200 |
Cisco Umbrella - DNS Request Category: Phishing |
LEGACY-S00201 |
Cisco Umbrella - DNS Request Category: Potentially Harmful |
LEGACY-S00202 |
Cisco Umbrella - DNS Request Category: Proxy/Anonymizer |
LEGACY-S00203 |
Cisco Umbrella - Proxy Logs with Cisco AMP Detections |
MATCH-S00269 |
Clipboard Copied |
MATCH-S00820 |
Cloud Credential File Accessed |
MATCH-S00412 |
Command Line Execution with Suspicious URL and AppData Strings |
LEGACY-S00013 |
Connection to High Entropy Domain |
MATCH-S00658 |
Container Management Utility in Container |
MATCH-S00657 |
Container Running as Root |
MATCH-S00410 |
Copy from Admin Share |
MATCH-S00758 |
CrashControl Registry Modification |
MATCH-S00443 |
Create Windows Share |
MATCH-S00591 |
Cred Dump-Tools Named Pipes |
MATCH-S00525 |
Credential Dumping Via Copy Command From Shadow Copy |
MATCH-S00526 |
Credential Dumping Via Symlink To Shadow Copy |
MATCH-S00586 |
Credential Dumping by LaZagne |
MATCH-S00513 |
Critical Severity Intrusion Signature |
LEGACY-S00189 |
Crypto Miner HTTP User Agent |
MATCH-S00592 |
Crypto Miner User Agent |
MATCH-S00348 |
Curl Start Combination |
LEGACY-S00014 |
Cylance Protect - Event Severity 1 |
LEGACY-S00015 |
Cylance Protect - Event Severity 2 |
LEGACY-S00016 |
Cylance Protect - Event Severity 3 |
LEGACY-S00017 |
Cylance Protect - Event Severity 4 |
LEGACY-S00018 |
Cylance Protect - Event Severity 5 |
LEGACY-S00019 |
Cylance Protect - Event Severity 6 |
LEGACY-S00020 |
Cylance Protect - Event Severity 7 |
LEGACY-S00021 |
Cylance Protect - Event Severity 8 |
LEGACY-S00022 |
Cylance Protect - Event Severity 9 |
LEGACY-S00024 |
DCE-RPC Service Control Call |
LEGACY-S00023 |
DCERPC - SAMR Enumeration of All Users |
THRESHOLD-S00044 |
DNS DGA Lookup Behavior - NXDOMAIN Responses |
LEGACY-S00026 |
DNS Lookup of High Entropy Domain |
MATCH-S00375 |
DNS RCE Exploit CVE-2020-1350 |
MATCH-S00211 |
DNS.EXE Observed as Parent Process |
MATCH-S00695 |
DPAPI Key Manipulation - Backup of Backup Key |
MATCH-S00696 |
DPAPI Key Manipulation - Extracting Backup Key |
MATCH-S00385 |
DTRACK Process Creation |
MATCH-S00441 |
Delete Windows Share |
MATCH-S00543 |
Detect Psexec With Accepteula Flag |
MATCH-S00565 |
Direct Outbound DNS Traffic |
LEGACY-S00028 |
Directory Traversal - Successful |
THRESHOLD-S00009 |
Directory Traversal - Unsuccessful |
LEGACY-S00029 |
Disabled Account Logon Attempt |
MATCH-S00544 |
Disabling Remote User Account Control |
MATCH-S00568 |
Dnscat Execution |
AGGREGATION-S00006 |
Docker Enumeration Detected on Host |
THRESHOLD-S00103 |
Domain Brute Force Attempt |
THRESHOLD-S00102 |
Domain Password Attack |
LEGACY-S00030 |
Domain Resolution in Non-Standard TLD |
LEGACY-S00031 |
Doublepulsar scan - likely not infected |
MATCH-S00319 |
Dridex Process Pattern |
MATCH-S00590 |
Elise Backdoor |
MATCH-S00527 |
Email Files Written Outside Of The Outlook Directory |
MATCH-S00572 |
Emotet Process Creation |
MATCH-S00587 |
Empire PowerShell Launch Parameters |
MATCH-S00576 |
Equation Group DLL_U Load |
MATCH-S00479 |
Excavator Utility |
THRESHOLD-S00074 |
Excessive Firewall Denies |
THRESHOLD-S00085 |
Excessive Outbound Firewall Blocks |
MATCH-S00682 |
Excessive Use of Escape Characters in Command Line |
LEGACY-S00033 |
Executable Downloaded - Content-Type Mismatch |
MATCH-S00360 |
Exfiltration and Tunneling Tools Execution |
MATCH-S00827 |
Exposed AWS SNS Topic Created |
MATCH-S00823 |
Exposed AWS SQS Queue Created |
MATCH-S00304 |
External Device Installation Denied |
MATCH-S00392 |
File or Folder Permissions Modifications |
MATCH-S00394 |
Findstr Launching .lnk File |
MATCH-S00454 |
Firewall Allowed SMB Traffic |
FIRST-S00047 |
First Seen ASN Associated with User for a Successful Azure AD Sign In Event |
FIRST-S00002 |
First Seen AWS API Call from User |
FIRST-S00023 |
First Seen AWS API Gateway Enumeration by User |
FIRST-S00084 |
First Seen AWS Bedrock API Call from User |
FIRST-S00071 |
First Seen AWS ConsoleLogin by User |
FIRST-S00036 |
First Seen AWS EKS API Call via CloudTrail from User |
FIRST-S00037 |
First Seen AWS EKS Admission Controller Created by IP Address |
FIRST-S00035 |
First Seen AWS EKS Secrets Enumeration from IP Address |
FIRST-S00024 |
First Seen AWS SSM RunShellScript SendCommand From User |
FIRST-S00003 |
First Seen AWS Secrets Manager API Call from User |
LEGACY-S00036 |
First Seen Access - SMB Share |
FIRST-S00001 |
First Seen Administrative Privileges Granted for User |
FIRST-S00026 |
First Seen Anonymous Logon Change Activity to Domain Controller |
FIRST-S00044 |
First Seen AppID Generating MailIItemsAccessed Event from User |
FIRST-S00048 |
First Seen Azure Device Code Authentication from User |
FIRST-S00019 |
First Seen Azure Member Addition to Group from User |
FIRST-S00020 |
First Seen Azure OAUTH Application Consent from User |
FIRST-S00080 |
First Seen Azure Portal access by User |
FIRST-S00021 |
First Seen Azure Virtual Machine Run Command Issued by User |
FIRST-S00046 |
First Seen Client Generating MailIItemsAccessed Event from User |
FIRST-S00028 |
First Seen Common Windows Recon Commands From User |
FIRST-S00013 |
First Seen Driver Load - Global |
FIRST-S00014 |
First Seen Driver Load - Host |
FIRST-S00007 |
First Seen DynamoDB Enumeration from User |
FIRST-S00073 |
First Seen Get-ADDefaultDomainPasswordPolicy |
FIRST-S00072 |
First Seen Group Policy Discovery Operation |
FIRST-S00031 |
First Seen IP Address Associated with User for a Successful Azure AD Sign In Event |
FIRST-S00062 |
First Seen IP Address Connecting to Active Directory Certificate Services Process |
FIRST-S00086 |
First Seen IP Address Performing Trufflehog AWS Credential Verification |
FIRST-S00027 |
First Seen InstallUtil Allow List Bypass From User |
FIRST-S00042 |
First Seen Ioreg Usage from User |
FIRST-S00017 |
First Seen Kerberoasting Attempt from User - Global |
FIRST-S00018 |
First Seen Kerberoasting Attempt from User - Host |
FIRST-S00032 |
First Seen Kubectl Command From User |
FIRST-S00004 |
First Seen Local Group Addition by User |
FIRST-S00015 |
First Seen Macro Execution from User |
FIRST-S00081 |
First Seen Model ID in AWS Bedrock Put Entitlement by User |
FIRST-S00088 |
First Seen NTLM Authentication to Host (User) |
FIRST-S00076 |
First Seen Net Command Use on Host |
FIRST-S00016 |
First Seen Non-Network/Non-System Logon from User |
FIRST-S00030 |
First Seen Outbound Connection to External IP Address on Port 445 from IP Address |
FIRST-S00010 |
First Seen PowerShell Execution from Computer |
FIRST-S00009 |
First Seen RDP Logon From User |
FIRST-S00085 |
First Seen Role Creating AWS Bedrock Agent |
FIRST-S00022 |
First Seen S3 Bucket ACL Enumeration by User |
FIRST-S00025 |
First Seen SMB Allowed Traffic From IP |
FIRST-S00034 |
First Seen Session Token Granted to User from New IP |
FIRST-S00029 |
First Seen Successful Authentication From Unexpected Country |
FIRST-S00065 |
First Seen Successful Authentication From Unexpected Country (SILENT MODE) |
FIRST-S00033 |
First Seen Terminal-Attached Pod Deployed to EKS |
FIRST-S00061 |
First Seen USB device in use on Windows host |
FIRST-S00087 |
First Seen User Creating or Modifying EC2 Launch Template |
FIRST-S00005 |
First Seen User Creation From User |
FIRST-S00082 |
First Seen User Enumerating AWS Bedrock Models |
FIRST-S00006 |
First Seen Weak Kerberos Encryption from User |
FIRST-S00038 |
First Seen Wget Usage from User |
FIRST-S00040 |
First Seen cURL execution from User |
FIRST-S00074 |
First Seen driverquery execution on host |
FIRST-S00059 |
First Seen esentutl command From User |
FIRST-S00079 |
First Seen gpresult execution on host |
FIRST-S00039 |
First Seen mdfind Usage from User |
FIRST-S00041 |
First Seen networksetup Usage from User |
FIRST-S00043 |
First Seen pbpaste Usage from User |
FIRST-S00058 |
First Seen vssadmin command From User |
FIRST-S00060 |
First Seen wbadmin command From User |
FIRST-S00008 |
First Seen whoami command From User |
LEGACY-S00037 |
Fortinet Critical App-Risk |
LEGACY-S00038 |
Fortinet High App-Risk |
MATCH-S00117 |
G Suite - Access - Access Transparency |
MATCH-S00115 |
G Suite - Admin - User Settings - Turn Off 2SV |
MATCH-S00133 |
G Suite - Admin Activity |
MATCH-S00125 |
G Suite - Drive - Drive Open To Public |
MATCH-S00301 |
G Suite - Excessive OAuth Application Permissions Scope |
MATCH-S00128 |
G Suite - Login - Account Warning |
MATCH-S00129 |
G Suite - Login - Government Attack Warning |
MATCH-S00121 |
G Suite - Mobile - Suspicious Activity |
MATCH-S00227 |
G Suite - Unauthorized OAuth Application |
MATCH-S00120 |
G Suite - User Accounts - 2SV Disabled |
MATCH-S00620 |
GCP Audit Cloud SQL Database Modified |
MATCH-S00621 |
GCP Audit GCE Firewall Rule Modified |
MATCH-S00622 |
GCP Audit GCE Network Route Created or Modified |
MATCH-S00623 |
GCP Audit GCE VPC Network Modified |
MATCH-S00615 |
GCP Audit IAM CreateServiceAccount Observed |
MATCH-S00624 |
GCP Audit IAM Custom Role Created or Modified |
MATCH-S00631 |
GCP Audit IAM Custom Role Deletion |
MATCH-S00630 |
GCP Audit IAM DeleteServiceAccount Observed |
MATCH-S00629 |
GCP Audit IAM DisableServiceAccount Observed |
MATCH-S00614 |
GCP Audit KMS Activity |
MATCH-S00613 |
GCP Audit Key Deleted or Disabled |
MATCH-S00611 |
GCP Audit ListQueues |
MATCH-S00626 |
GCP Audit Logging Sink Modified |
MATCH-S00627 |
GCP Audit Pub/Sub Subscriber Modified |
MATCH-S00628 |
GCP Audit Pub/Sub Topic Deleted |
THRESHOLD-S00088 |
GCP Audit Reconnaissance Activity |
MATCH-S00612 |
GCP Audit Secrets Manager Activity |
THRESHOLD-S00089 |
GCP Audit Unauthorized API Calls |
MATCH-S00618 |
GCP Bucket Enumerated |
MATCH-S00619 |
GCP Bucket Modified |
MATCH-S00616 |
GCP Bucket Open |
MATCH-S00617 |
GCP GCPloit Exploitation Framework Used |
CHAIN-S00013 |
GCP IDS Detection Followed by API Call |
MATCH-S00709 |
GCP Image Creation |
MATCH-S00710 |
GCP Image Deletion |
THRESHOLD-S00104 |
GCP Image Discovery |
MATCH-S00711 |
GCP Image Modification |
MATCH-S00712 |
GCP Instance Creation |
MATCH-S00713 |
GCP Instance Deletion |
THRESHOLD-S00105 |
GCP Instance Discovery |
MATCH-S00714 |
GCP Instance Modification |
MATCH-S00625 |
GCP Permission Denied |
THRESHOLD-S00091 |
GCP Port Scan |
THRESHOLD-S00090 |
GCP Port Sweep |
LEGACY-S00039 |
GitHub Raw URL Resource Request |
MATCH-S00098 |
Global YARA Rule |
MATCH-S00535 |
Golden SAML Indicator : Certificate Export |
MATCH-S00414 |
Grabbing Sensitive Hives via Reg Utility |
MATCH-S00325 |
Greenbug Campaign Indicators |
MATCH-S00894 |
HAR file creation observed on host |
LEGACY-S00040 |
HTTP CloudFlare Protocol Violation or Empty Response |
LEGACY-S00041 |
HTTP External Request to PowerShell Extension |
LEGACY-S00042 |
HTTP Request to Domain in Non-Standard TLD |
LEGACY-S00043 |
HTTP Request with Single Header |
THRESHOLD-S00015 |
HTTP Response Error Spike - External |
THRESHOLD-S00016 |
HTTP Response Error Spike - Internal |
THRESHOLD-S00114 |
HTTP Response Error Spike to AWS EKS |
LEGACY-S00044 |
HTTP Shell Script Download Disguised as a Common Web File |
MATCH-S00203 |
HTTP activity over port 53 - Possible SIGRED |
LEGACY-S00045 |
HTTP request for single character file name |
LEGACY-S00046 |
Hexadecimal User-Agent |
LEGACY-S00027 |
Hexadecimal in DNS Query Domain |
MATCH-S00666 |
High Severity Intrusion Signature |
THRESHOLD-S00078 |
High Volume of DNS 'Any' Queries |
LEGACY-S00047 |
High risk file extension download without hostname and referrer |
LEGACY-S00048 |
Houdini/Iniduoh/njRAT User-Agent |
LEGACY-S00049 |
IP Address Scan - External |
LEGACY-S00050 |
IP Address Scan - Internal |
MATCH-S00367 |
Impacket Lateralization Detection |
MATCH-S00482 |
Impacket-Obfuscation SMBEXEC Utility |
MATCH-S00483 |
Impacket-Obfuscation WMIEXEC Utility |
THRESHOLD-S00097 |
Impossible Travel - Successful |
THRESHOLD-S00098 |
Impossible Travel - Unsuccessful |
THRESHOLD-S00079 |
Inbound Port Scan |
MATCH-S00669 |
Informational Severity Intrusion Signature |
MATCH-S00816 |
Interactive Logon to Domain Controller |
MATCH-S00138 |
Interactive Logon with Service Account |
LEGACY-S00053 |
Internal Communication on Unassigned Low Ports - Destination Match |
THRESHOLD-S00080 |
Internal Port Scan |
THRESHOLD-S00081 |
Internal Port Sweep |
THRESHOLD-S00514 |
Intrusion Scan - Targeted |
THRESHOLD-S00515 |
Intrusion Sweep |
MATCH-S00322 |
Judgement Panda Credential Access Activity |
MATCH-S00334 |
Judgement Panda Exfil Activity |
MATCH-S00700 |
KeePass Brute Force Tool Detection |
MATCH-S00703 |
KeeThief Detection |
MATCH-S00364 |
Kerberos Manipulation |
MATCH-S00702 |
Keychain Credential Dumping |
MATCH-S00701 |
Keychain Directory Zipped |
MATCH-S00445 |
Known Ransomware File Extensions |
MATCH-S00653 |
Kubernetes AWS Suspicious kubectl Calls |
MATCH-S00639 |
Kubernetes Anonymous Request Authorized |
MATCH-S00651 |
Kubernetes CreateCronjob |
MATCH-S00652 |
Kubernetes DeleteCronjob |
MATCH-S00650 |
Kubernetes ListCronjobs |
MATCH-S00648 |
Kubernetes ListSecrets |
MATCH-S00640 |
Kubernetes Pod Created in Kube Namespace |
MATCH-S00641 |
Kubernetes Pod Created with hostNetwork |
MATCH-S00647 |
Kubernetes Pod Deletion |
MATCH-S00837 |
Kubernetes Secrets Enumeration via Kubectl |
MATCH-S00642 |
Kubernetes Service Account Created in Kube Namespace |
MATCH-S00649 |
Kubernetes Service Account Token File Accessed |
MATCH-S00643 |
Kubernetes Service Created with NodePort |
MATCH-S00645 |
Kubernetes User Attached to a Pod |
MATCH-S00646 |
Kubernetes User Exec into a Pod |
MATCH-S00461 |
LNKSmasher Utility Commands |
MATCH-S00340 |
LSASS Memory Dump |
MATCH-S00429 |
LSASS Memory Dumping |
MATCH-S00457 |
Large File Upload |
MATCH-S00396 |
Large Outbound ICMP Packets |
MATCH-S00844 |
LastPass - Account Created |
MATCH-S00854 |
LastPass - Failed Login |
MATCH-S00846 |
LastPass - Folder Permissions Updated |
MATCH-S00855 |
LastPass - Login |
MATCH-S00847 |
LastPass - Master Password Changed |
MATCH-S00848 |
LastPass - Password Changed |
MATCH-S00849 |
LastPass - Personal Share |
MATCH-S00850 |
LastPass - Policy Added |
MATCH-S00851 |
LastPass - Policy Deleted |
MATCH-S00852 |
LastPass - Shared Folder Created |
MATCH-S00853 |
LastPass - Super Admin Password Reset |
CHAIN-S00004 |
Lateral Movement Using the Windows Hidden Admin Share |
LEGACY-S00054 |
Likely doublepulsar Infected |
MATCH-S00784 |
Linux Host Entered Promiscuous Mode |
MATCH-S00687 |
Linux Security Tool Usage |
MATCH-S00746 |
Loadable Kernel Module Dependency Install |
MATCH-S00745 |
Loadable Kernel Module Enumeration |
MATCH-S00723 |
Loadable Kernel Module Modifications |
MATCH-S00505 |
Local User Created |
MATCH-S00509 |
Logon with Local Credentials |
THRESHOLD-S00099 |
Long URL Containing SQL Commands |
MATCH-S00668 |
Low Severity Intrusion Signature |
MATCH-S00578 |
Lsass Registry Key Modified |
MATCH-S00573 |
MS Office Memory Corruption Vulnerability Exploit |
MATCH-S00811 |
MS Office Product Spawning Msdt.exe - CVE-2022-30190 |
THRESHOLD-S00018 |
MS-LSAT Username Enumeration |
MATCH-S00352 |
MSHTA Suspicious Execution |
MATCH-S00534 |
MacOS - Re-Opened Applications |
MATCH-S00729 |
MacOS Gatekeeper Bypass |
MATCH-S00731 |
MacOS System Integrity Protection Disabled |
MATCH-S00579 |
Malicious Named Pipes |
MATCH-S00161 |
Malicious PowerShell Get Commands |
MATCH-S00190 |
Malicious PowerShell Invoke Commands |
MATCH-S00198 |
Malicious PowerShell Keywords |
MATCH-S00582 |
Malicious Service Installs |
MATCH-S00519 |
Malware Cleaned |
MATCH-S00518 |
Malware Not Cleaned |
THRESHOLD-S00517 |
Malware Outbreak |
MATCH-S00331 |
MavInject Process Injection |
MATCH-S00042 |
McAfee Web Gateway - Poor Reputation |
MATCH-S00638 |
McAfee Web Gateway - Suspicious or Malicious Categories |
MATCH-S00667 |
Medium Severity Intrusion Signature |
MATCH-S00355 |
Meterpreter or Cobalt Strike Getsystem Service Start |
MATCH-S00725 |
Microsoft CHM File Observed |
MATCH-S00763 |
Microsoft Office Add-In Persistence |
MATCH-S00813 |
Microsoft Support Diagnostic Tool Invoking PowerShell - CVE-2022-30190 |
MATCH-S00812 |
Microsoft Support Diagnostic Tool with BrowseForFile - CVE-2022-30190 |
MATCH-S00888 |
Microsoft Teams External Access Enabled |
MATCH-S00889 |
Microsoft Teams Guest Access Enabled |
LEGACY-S00183 |
Mimecast - Message with Virus Detections from IP |
LEGACY-S00184 |
Mimecast - Message with Virus Detections to Recipient |
LEGACY-S00185 |
Mimecast - SPAM Message from IP |
LEGACY-S00186 |
Mimecast - SPAM Message to Recipient |
MATCH-S00681 |
Mimecast Message Held |
MATCH-S00397 |
Mimikatz Loaded Images Detected |
MATCH-S00404 |
Mimikatz via Powershell and EventID 4703 |
MATCH-S00750 |
Modification of Windows Network Logon Scripts |
MATCH-S00466 |
MsiExec Web Install |
THRESHOLD-S00112 |
Multiple Azure Firewall Deny Events for IP |
THRESHOLD-S00113 |
Multiple Azure Firewall Deny Events for URL |
MATCH-S00419 |
Multiple File Extensions |
THRESHOLD-S00077 |
Multiple Windows Account Lockouts On Endpoint |
MATCH-S00743 |
Network Connection from Control Panel - Sysmon |
MATCH-S00736 |
Network Connection from InstallUtil - Sysmon |
MATCH-S00737 |
Network Connection from MSHTA - Sysmon |
MATCH-S00738 |
Network Connection from Msiexec - Sysmon |
MATCH-S00744 |
Network Connection from Odbcconf - Sysmon |
MATCH-S00740 |
Network Connection from Regsvcs/Regasm - Sysmon |
MATCH-S00742 |
Network Connection from Regsvr32 - Sysmon |
MATCH-S00741 |
Network Connection from Rundll32 - Sysmon |
MATCH-S00739 |
Network Connection from Verclsid - Sysmon |
THRESHOLD-S00059 |
Network Share Scan |
THRESHOLD-S00060 |
Network Share Sweep |
MATCH-S00868 |
New Binding Role Created on AWS EKS |
MATCH-S00867 |
New Cluster Admin Binding Role Created on AWS EKS |
MATCH-S00655 |
New Container Uploaded to AWS ECR |
MATCH-S00644 |
New Kubernetes Namespace Created |
MATCH-S00156 |
New Suspicious cmd.exe / regedit.exe / powershell.exe Service Launch |
MATCH-S00152 |
New or Renamed Windows User Account Mimicking a Machine Account |
MATCH-S00895 |
NinjaCopy Usage Detected |
LEGACY-S00181 |
Noncompliant Protocol Tunnel Over Common Service Port |
MATCH-S00402 |
Normalized Security Signal |
MATCH-S00288 |
NotPetya Ransomware Activity |
MATCH-S00455 |
O365 - Successful Authentication with PowerShell User Agent |
MATCH-S00068 |
O365 - Users Password Changed |
MATCH-S00069 |
O365 - Users Password Reset |
MATCH-S00828 |
Office 365 Exchange Transport Rule Created |
MATCH-S00829 |
Office 365 Exchange Transport Rule Enabled |
MATCH-S00830 |
Office 365 Forwarding Rule Created |
MATCH-S00833 |
Office 365 Inbox Rule Created |
MATCH-S00832 |
Office 365 Inbox Rule Updated |
MATCH-S00831 |
Office 365 Unified Audit Logging Disabled |
MATCH-S00137 |
Office Application or Browser Launching Shell |
MATCH-S00906 |
Okta - Application Created |
MATCH-S00903 |
Okta - Device Added To User |
MATCH-S00904 |
Okta - Device Removed From User |
FIRST-S00067 |
Okta - First Seen Client ID/ASN combo in successful OIDC token grant |
FIRST-S00068 |
Okta - First Seen User Accessing Admin Application |
FIRST-S00066 |
Okta - First Seen User Requesting Report |
CHAIN-S00020 |
Okta - MFA Denied Followed by Successful Logon |
MATCH-S00908 |
Okta - MFA Request Denied by User |
OUTLIER-S00018 |
Okta - Outlier in ASNs Used to Access Applications |
OUTLIER-S00017 |
Okta - Outlier in MFA Attempts Denied by User |
OUTLIER-S00016 |
Okta - Outlier in OIDC token request failures |
MATCH-S00907 |
Okta - Policy Rule Added |
MATCH-S00905 |
Okta - Programmatic Access to Users API Endpoint |
AGGREGATION-S00008 |
Okta - Session Anomaly (Multiple ASNs) |
AGGREGATION-S00009 |
Okta - Session Anomaly (Multiple User Agents) |
MATCH-S00635 |
Okta API Token Created |
MATCH-S00433 |
Okta Account Lockout |
MATCH-S00769 |
Okta Account Primary Email Address Update |
MATCH-S00634 |
Okta Admin App Access Attempt Failed |
MATCH-S00633 |
Okta Admin App Accessed |
MATCH-S00632 |
Okta Administrator Access Granted |
MATCH-S00765 |
Okta Credential Access User Impersonation |
MATCH-S00768 |
Okta MFA Bypass Attempt |
MATCH-S00766 |
Okta MFA Deactivated for User |
MATCH-S00767 |
Okta MFA Device Reset |
MATCH-S00636 |
Okta User Attempted to Access Unauthorized App |
MATCH-S00604 |
OneLogin - API Credentials - Key Used from Untrusted Location |
MATCH-S00605 |
OneLogin - API Credentials - New Key Created |
MATCH-S00609 |
OneLogin - Login Failed - MFA Unsuccessful |
MATCH-S00556 |
Outbound Data Transfer Protocol Over Non-standard Port |
MATCH-S00554 |
Outbound IRC Traffic |
LEGACY-S00056 |
Outbound TFTP Traffic |
THRESHOLD-S00048 |
Outbound Traffic to Countries Outside the United States |
OUTLIER-S00019 |
Outlier in AWS Bedrock API Calls from User |
OUTLIER-S00022 |
Outlier in AWS Bedrock Foundation Model Enumeration Calls from User |
OUTLIER-S00013 |
Outlier in Data Outbound Per Day by Admin or Sensitive Device |
OUTLIER-S00015 |
Outlier in Data Outbound Per Hour by Admin or Sensitive Device |
MATCH-S00755 |
Outlook Form Creation |
MATCH-S00756 |
Outlook Homepage Modification |
MATCH-S00683 |
Overly Permissive Chmod Command |
MATCH-S00900 |
Overly-Permissive Active Directory Certificate Template Loaded |
MATCH-S00890 |
Owner Added to Azure Service Principal |
MATCH-S00698 |
PATH Set to Current Directory |
MATCH-S00610 |
PSExec Named Pipe Created by Non-PsExec Process |
MATCH-S00465 |
PXELoot Utility |
MATCH-S00659 |
Package Management Utility in Container |
THRESHOLD-S00095 |
Password Attack |
LEGACY-S00058 |
Pastebin Raw URL Resource Request |
MATCH-S00704 |
Persistence Registry Key Modification |
THRESHOLD-S00520 |
Persistent Malware Infection |
MATCH-S00697 |
Pkexec Privilege Escalation - CVE-2021-4034 |
MATCH-S00887 |
Port Forwarding Enabled via Visual Studio Code |
LEGACY-S00059 |
Port Scan - External |
LEGACY-S00060 |
Port Scan - Internal |
LEGACY-S00005 |
Possible Black Energy Command and Control |
THRESHOLD-S00026 |
Possible Credential Abuse |
LEGACY-S00061 |
Possible DNS Data Exfiltration |
THRESHOLD-S00040 |
Possible DNS over TLS (DoT) Activity |
LEGACY-S00008 |
Possible Dynamic DNS Domain |
MATCH-S00835 |
Possible Dynamic URL Domain |
MATCH-S00637 |
Possible Malicious Download |
MATCH-S00451 |
Possible Malicious Nirsoft Tool Usage |
THRESHOLD-S00028 |
Possible TOR Connection |
MATCH-S00876 |
Potential AWS Security Credential Access via curl |
CHAIN-S00019 |
Potential Active Directory Certificate Services Enrollment Agent Misconfiguration |
CHAIN-S00012 |
Potential Azure Persistence via Automation Accounts |
MATCH-S00459 |
Potential Cobalt Strike Profile |
MATCH-S00865 |
Potential Docker Escape via Command Line |
CHAIN-S00014 |
Potential Docker container escape via Cgroups |
MATCH-S00558 |
Potential Inbound VNC Traffic |
CHAIN-S00011 |
Potential InstallUtil Allow List Bypass |
MATCH-S00822 |
Potential Microsoft Office In-Memory Token Theft |
MATCH-S00753 |
Potential Microsoft Office Template Abuse |
MATCH-S00200 |
Potential Pass the Hash Activity |
MATCH-S00546 |
Potential Reconnaissance Obfuscation |
MATCH-S00824 |
Potential XMRig Execution with Traffic |
LEGACY-S00062 |
Potential malicious JVM download |
LEGACY-S00063 |
Potential malicious document executed |
MATCH-S00898 |
Potentially Misconfigured Active Directory Certificate Template Loaded |
MATCH-S00901 |
Potentially Vulnerable Active Directory Certificate Services Template Loaded |
LEGACY-S00064 |
Potentially vulnerable software detected |
MATCH-S00136 |
PowerShell Encoded Command |
MATCH-S00149 |
PowerShell File Download |
LEGACY-S00066 |
PowerShell Remote Administration |
MATCH-S00425 |
PowerShell Rundll32 Remote Thread Creation |
LEGACY-S00065 |
PowerShell via SMB |
MATCH-S00449 |
Powershell Execution Policy Bypass |
MATCH-S00580 |
Powerview Add-DomainObjectAcl DCSync AD Extend Right |
MATCH-S00866 |
Privileged Pod Created on AWS EKS |
MATCH-S00427 |
Process Dump via Rundll32 and Comsvcs.dll |
MATCH-S00187 |
Process Execution Inside Webserver Root Folder |
MATCH-S00691 |
Productivity App Spawning Rundll32 or Regsvr32 |
MATCH-S00694 |
Proofpoint POD Suspicious Email |
MATCH-S00078 |
Proofpoint TAP - IP Sent Email with Malware |
MATCH-S00079 |
Proofpoint TAP - IP Sent Email with Malware Link |
MATCH-S00080 |
Proofpoint TAP - IP Sent Email with Phishing Link |
MATCH-S00081 |
Proofpoint TAP - IP Sent Impostor Email |
MATCH-S00082 |
Proofpoint TAP - IP Sent Phishing Email |
MATCH-S00084 |
Proofpoint TAP - User Clicked Malware Link in Email |
MATCH-S00085 |
Proofpoint TAP - User Clicked Phishing Link in Email |
MATCH-S00083 |
Proofpoint TAP - User Received Email with Malware |
MATCH-S00086 |
Proofpoint TAP - User Received Impostor Email |
MATCH-S00087 |
Proofpoint TAP - User Received Phishing Email |
LEGACY-S00057 |
PsExec Admin Tool Detection |
MATCH-S00439 |
Psr.exe Capture Screenshots |
MATCH-S00584 |
Pwndrp Access |
MATCH-S00575 |
QBot Process Creation |
MATCH-S00265 |
QuarksPwDump Dump File Observed |
LEGACY-S00068 |
RDP Brute Force - Success |
THRESHOLD-S00031 |
RDP Brute Force Attempt |
LEGACY-S00069 |
RDP Error Messages |
MATCH-S00176 |
RDP Login from Localhost |
MATCH-S00502 |
RDP Traffic to Unexpected Host |
LEGACY-S00071 |
RDP with non-standard client |
MATCH-S00167 |
Recon Using Common Windows Commands |
MATCH-S00545 |
Registry Keys For Creating Shim Databases |
MATCH-S00747 |
Registry Modification - Active Setup |
MATCH-S00705 |
Registry Modification - Authentication Package |
MATCH-S00730 |
Registry Modification - Code Signing |
MATCH-S00754 |
Registry Modification - Microsoft Office Test Function Registry Entry |
MATCH-S00733 |
Registry Modification - Print Processors |
MATCH-S00735 |
Registry Modification - SIP or Trust Provider |
MATCH-S00722 |
Registry Modification - Security Support Provider |
MATCH-S00706 |
Registry Modification - Time Providers |
MATCH-S00749 |
Registry Modification - Windows Logon Script |
MATCH-S00707 |
Registry Modification - Winlogon Helper DLL |
MATCH-S00569 |
Registry Persistence Mechanisms |
MATCH-S00689 |
Regsvr32.exe Silent Mode from TEMP Directory |
MATCH-S00475 |
Renamed MSBUILD.EXE by Arguments |
LEGACY-S00001 |
Request to Anomalous Web Server Software |
LEGACY-S00072 |
Request to DNS over HTTPS (DoH) Service Provider |
MATCH-S00501 |
Rogue DHCP Server - Cisco |
MATCH-S00328 |
Rubeus Hack Tool |
MATCH-S00498 |
Rubeus Hack Tool Logon Process Name |
MATCH-S00690 |
Rundll32.exe Load from TEMP Directory with By Ordinal Load |
MATCH-S00346 |
Ryuk Ransomware Endpoint Indicator |
MATCH-S00506 |
SC Exe Manipulating Windows Services |
LEGACY-S00075 |
SMB - Remote execution and/or persistence via scheduled task using ATSVC |
THRESHOLD-S00032 |
SMB Brute Force Attempt |
LEGACY-S00073 |
SMB External to Internal File Share Access |
LEGACY-S00074 |
SMB Internal to External traffic |
THRESHOLD-S00033 |
SMB Scanning Detected |
LEGACY-S00076 |
SMB write to hidden admin share |
MATCH-S00560 |
SMTP Traffic from Non-SMTP Servers |
LEGACY-S00077 |
SQL Injection Attacker |
LEGACY-S00078 |
SQL Injection Victim |
LEGACY-S00079 |
SQL-Select-From |
THRESHOLD-S00034 |
SSH Authentication Failures |
LEGACY-S00080 |
SSH Interesting Hostname Login |
MATCH-S00826 |
SSH Keys Added to EC2 Instance |
LEGACY-S00084 |
SSL Certificate Expired |
LEGACY-S00085 |
SSL Certificate Expires Soon |
LEGACY-S00086 |
SSL Certificate Not Valid Yet |
LEGACY-S00087 |
SSL Heartbleed Attack |
LEGACY-S00088 |
SSL Heartbleed Attack Successful |
LEGACY-S00089 |
SSL Heartbleed Many Requests |
LEGACY-S00090 |
SSL Heartbleed Odd Length |
LEGACY-S00091 |
SSL Invalid Server Cert |
THRESHOLD-S00061 |
SYSVOL Share Sweep |
MATCH-S00468 |
SafetyKatz Credential Stealer |
MATCH-S00774 |
Salesforce Custom Permission Creation |
THRESHOLD-S00108 |
Salesforce Excessive Documents Downloaded |
MATCH-S00770 |
Salesforce Login Attempt from Disabled Account |
MATCH-S00773 |
Salesforce LoginAs Event |
MATCH-S00780 |
Salesforce Permission Set Addition |
MATCH-S00778 |
Salesforce Permission Set Assigned |
MATCH-S00779 |
Salesforce Permission Set Creation |
MATCH-S00782 |
Salesforce Permission Set Deletion |
MATCH-S00781 |
Salesforce Permission Set Modification |
MATCH-S00772 |
Salesforce Report Exported |
MATCH-S00777 |
Salesforce Role Creation |
MATCH-S00775 |
Salesforce User Creation |
MATCH-S00776 |
Salesforce User Role Changed |
MATCH-S00771 |
Salesforce WaveDownload Event |
MATCH-S00528 |
Samsam Test File Write |
MATCH-S00153 |
Scheduled Task Created via PowerShell |
MATCH-S00214 |
Scheduled Task Creation with Suspicious Task Executable |
MATCH-S00529 |
Schtasks Scheduling Job On Remote System |
MATCH-S00530 |
Schtasks Used For Forcing A Reboot |
MATCH-S00547 |
Script Execution Via WMI |
MATCH-S00447 |
Script Interpreter Launched by Cmd |
LEGACY-S00093 |
Script/CLI UserAgent string |
MATCH-S00478 |
Seatbelt Utility |
MATCH-S00893 |
Secret Added to Azure Service Principal |
MATCH-S00437 |
Secure Deletion with SDelete |
MATCH-S00299 |
SecurityXploded Tool |
LEGACY-S00094 |
Self-signed Certificates |
MATCH-S00834 |
Sensitive Registry Key (WDigest) Edit |
LEGACY-S00095 |
Server-Side Code Injection in URL |
CHAIN-S00010 |
Service Installation Followed By Elevated CMD Prompt |
MATCH-S00296 |
Shadow Copies Deletion Using OS Utilities |
MATCH-S00406 |
Shadow Copy Creation |
MATCH-S00471 |
SharPersist A Utility |
MATCH-S00469 |
SharPersist Utility |
MATCH-S00472 |
SharPivot Utility |
THRESHOLD-S00111 |
Sharepoint - Excessive Documents Accessed by External IP |
THRESHOLD-S00101 |
Sharepoint - Excessive Documents Accessed by User |
THRESHOLD-S00100 |
Sharepoint - Excessive Documents Downloaded |
THRESHOLD-S00110 |
Sharepoint - External IP Downloaded Excessive Documents |
MATCH-S00473 |
SharpStomp Utility |
LEGACY-S00096 |
Shellshock |
MATCH-S00692 |
Silent Regsvr32 Scheduled Task Creation on Command Line |
THRESHOLD-S00086 |
Slack - Mass Download Events |
THRESHOLD-S00087 |
Slack - Possible Session Hijacking |
MATCH-S00370 |
Snatch Ransomware |
MATCH-S00571 |
Sofacy Trojan Loader |
MATCH-S00480 |
Solarwinds Suspicious Child Processes |
MATCH-S00481 |
Solarwinds Suspicious URL Hostname |
MATCH-S00422 |
Spaces Before File Extension |
OUTLIER-S00005 |
Spike in AWS API Call from User |
OUTLIER-S00011 |
Spike in AWS AccessDenied Events by assumedrole |
OUTLIER-S00004 |
Spike in Azure Firewall Deny Events from Source IP |
OUTLIER-S00006 |
Spike in Data Transferred Outbound by User |
OUTLIER-S00008 |
Spike in Failed Azure Sign In Attempts Due to Bad Password from IP Address |
OUTLIER-S00003 |
Spike in Failed Share Access by User |
OUTLIER-S00001 |
Spike in Login Failures from a User |
OUTLIER-S00009 |
Spike in PowerShell Command Line Length From Host |
OUTLIER-S00002 |
Spike in Successful Distinct Share Access |
OUTLIER-S00010 |
Spike in URL Length from IP Address |
OUTLIER-S00007 |
Spike in Windows Administrative Privileges Granted for User |
MATCH-S00507 |
Spoolsv Child Process Created |
MATCH-S00783 |
Spring4Shell Exploitation - URL |
CHAIN-S00008 |
Successful Brute Force |
MATCH-S00196 |
Successful Overpass the Hash Attempt |
MATCH-S00090 |
Sumo Logic Scheduled Searches |
MATCH-S00470 |
Sunburst Suspicious File Writes |
MATCH-S00337 |
Suspect Svchost Activity |
MATCH-S00841 |
Suspicious AWS CLI Keys Access on Linux Host |
AGGREGATION-S00003 |
Suspicious AWS Lambda Enumeration |
MATCH-S00899 |
Suspicious Active Directory Certificate Modification |
MATCH-S00902 |
Suspicious Active Directory Certificate Modification - Enrollment Agent |
MATCH-S00817 |
Suspicious Azure Active Directory Device Code Authentication |
MATCH-S00842 |
Suspicious Azure CLI Keys Access on Linux Host |
MATCH-S00359 |
Suspicious Certutil Command |
MATCH-S00356 |
Suspicious Compression Tool Parameters |
MATCH-S00362 |
Suspicious Curl File Upload |
LEGACY-S00105 |
Suspicious DC Logon |
MATCH-S00499 |
Suspicious Email Attachment Extension |
LEGACY-S00106 |
Suspicious Email Origin |
MATCH-S00476 |
Suspicious Execution of Search Indexer |
MATCH-S00293 |
Suspicious External Device Installation |
MATCH-S00843 |
Suspicious GCP CLI Keys Access on Linux Host |
LEGACY-S00182 |
Suspicious HTTP User-Agent |
AGGREGATION-S00004 |
Suspicious K8s Enumeration |
MATCH-S00840 |
Suspicious Lambda Function - IAM Policy Attached |
CHAIN-S00015 |
Suspicious Linux Execution Chain |
MATCH-S00464 |
Suspicious Non-Standard InstallUtil Execution |
MATCH-S00917 |
Suspicious PowerShell Application Window Discovery COM method |
MATCH-S00191 |
Suspicious PowerShell Keywords |
MATCH-S00920 |
Suspicious PowerShell Window Discovery Cmdlet execution |
MATCH-S00135 |
Suspicious Registry Key Modification |
MATCH-S00164 |
Suspicious Shells Spawned by Web Servers |
MATCH-S00500 |
Suspicious Shortcut File Launching Process |
AGGREGATION-S00005 |
Suspicious System Enumeration Occurring in Quick Succession |
MATCH-S00350 |
Suspicious Typical Malware Back Connect Ports |
MATCH-S00431 |
Suspicious Use of Procdump |
MATCH-S00477 |
Suspicious Use of Workflow Compiler for Payload Execution |
MATCH-S00158 |
Suspicious Windows ANONYMOUS LOGON Account Created |
MATCH-S00551 |
Suspicious Writes To System Volume Information |
MATCH-S00550 |
Suspicious Writes To Windows Recycle Bin |
MATCH-S00918 |
Suspicious cat of PAM common-password policy |
MATCH-S00886 |
Suspicious chmod Execution |
MATCH-S00342 |
Suspicious use of Dev-Tools-Launcher |
MATCH-S00699 |
Sysmon - RawAccessRead Event |
MATCH-S00279 |
TAIDOOR RAT DLL Load |
MATCH-S00595 |
Telegram API Access |
LEGACY-S00170 |
The Audit Log was Cleared - 1102 |
LEGACY-S00110 |
Threat Intel - Device IP Matched Threat Intel Domain Name |
LEGACY-S00111 |
Threat Intel - Device IP Matched Threat Intel URL |
MATCH-S00555 |
Threat Intel - Inbound Traffic Context |
LEGACY-S00109 |
Threat Intel - Matched Domain Name |
LEGACY-S00108 |
Threat Intel - Matched File Hash |
MATCH-S00815 |
Threat Intel - Successful Authentication from Threat IP |
LEGACY-S00107 |
Threat Intel Match - IP Address |
THRESHOLD-S00075 |
Too Many Kerberos Encryption Downgrade SPNs (Kerberoasting) |
THRESHOLD-S00036 |
Too many empty/refused DNS queries |
MATCH-S00561 |
Traffic From Embargoed Countries |
MATCH-S00562 |
Traffic To Embargoed Countries |
MATCH-S00559 |
Traffic to Honeypot IP |
MATCH-S00563 |
Traffic to Proxy Anonymizers |
MATCH-S00588 |
Trickbot Malware Recon Activity |
MATCH-S00925 |
Trufflehog AWS Credential Verification Detected |
MATCH-S00577 |
Turla Group Commands |
MATCH-S00542 |
Unauthorized Access Attempt Detected |
MATCH-S00313 |
Unauthorized External Device Installation |
MATCH-S00751 |
Unix/Linux RC Script Modification |
MATCH-S00531 |
Unload Sysmon Filter Driver |
MATCH-S00656 |
Unrecognized Container Image |
MATCH-S00757 |
Unsafe Outlook Rule Creation Enabled |
MATCH-S00344 |
Unsigned Image Loaded by LSASS |
MATCH-S00762 |
Unusual Staging Directory - PolicyDefinitions |
MATCH-S00567 |
Ursnif Malware Registry Key |
THRESHOLD-S00064 |
User Account Created and Deleted in 24 Hours |
MATCH-S00504 |
User Added to Local Administrators |
CHAIN-S00007 |
User Created and Quickly Deleted on Linux Machine |
MATCH-S00463 |
UserInit Process Launched by MSBuild.exe |
LEGACY-S00165 |
VBS file downloaded from Internet |
MATCH-S00892 |
Value Added to Azure NSG Group |
MATCH-S00761 |
Volume Shadow Copy Service Stopped |
MATCH-S00583 |
WCE wceaux.dll Access |
MATCH-S00150 |
WMI Launching Shell |
MATCH-S00147 |
WMI Managed Object Format (MOF) Process Execution |
MATCH-S00523 |
WMI Permanent Event Subscription |
MATCH-S00524 |
WMI Permanent Event Subscription - Sysmon |
MATCH-S00760 |
WMI Ping Sweep |
MATCH-S00146 |
WMI Process Call Create |
MATCH-S00151 |
WMI Process Get Brief |
MATCH-S00522 |
WMI Temporary Event Subscription |
MATCH-S00379 |
WMIExec VBS Script |
MATCH-S00570 |
WMIPRVSE Spawning Process |
MATCH-S00316 |
WannaCry Ransomware |
MATCH-S00400 |
Web Download via Office Binaries |
MATCH-S00557 |
Web Request to IP Address |
MATCH-S00566 |
Web Request to Punycode Domain |
MATCH-S00539 |
Web Servers Executing Suspicious Processes |
MATCH-S00174 |
Web Services Executing Common Web Shell Commands |
THRESHOLD-S00041 |
Websense - Blocked Activity Threshold |
MATCH-S00684 |
Wget Passed to Script Execution Command |
MATCH-S00521 |
Windows - Critical Service Disabled via Command Line |
MATCH-S00284 |
Windows - Delete Windows Backup Catalog |
MATCH-S00693 |
Windows - Denied RDP |
MATCH-S00181 |
Windows - Domain Trust Discovery |
THRESHOLD-S00065 |
Windows - Excessive User Interactive Logons Across Multiple Hosts |
MATCH-S00202 |
Windows - Incoming LSASS Network Connection - Zerologon Behavior(CVE-2020-1472) |
MATCH-S00168 |
Windows - Local System executing whoami.exe |
MATCH-S00169 |
Windows - Microsoft Office Add-In File Created |
MATCH-S00310 |
Windows - Network Connection from CMSTP |
MATCH-S00162 |
Windows - Network trace capture using netsh.exe |
MATCH-S00159 |
Windows - Permissions Group Discovery |
MATCH-S00268 |
Windows - Possible Impersonation Token Creation Using Runas |
MATCH-S00276 |
Windows - Possible Squiblydoo Technique Observed |
MATCH-S00281 |
Windows - PowerShell Process Discovery |
MATCH-S00171 |
Windows - Powershell Scheduled Task Creation from PowerSploit or Empire |
MATCH-S00185 |
Windows - Remote System Discovery |
MATCH-S00272 |
Windows - Rogue Domain Controller - dcshadow |
MATCH-S00170 |
Windows - Scheduled Task Creation |
CHAIN-S00002 |
Windows - Suspicious Anonymous Logon Activity - Zerologon Behavior(CVE-2020-1472) |
MATCH-S00285 |
Windows - Suspicious CMSTP Process Spawn |
MATCH-S00192 |
Windows - System Network Configuration Discovery |
MATCH-S00194 |
Windows - System Time Discovery |
MATCH-S00107 |
Windows - User Adds Self to Security Group |
MATCH-S00172 |
Windows - WiFi Credential Harvesting with netsh |
LEGACY-S00169 |
Windows Account Added To Privileged Security Group |
LEGACY-S00168 |
Windows Account Locked Out - 4740 |
MATCH-S00532 |
Windows Adfind Exe |
MATCH-S00189 |
Windows Admin User Remote Logon |
MATCH-S00552 |
Windows Connhost Started Forcefully |
MATCH-S00274 |
Windows Credential Editor (WCE) Tool Use Detected |
MATCH-S00291 |
Windows Credential Editor (WCE) in use |
MATCH-S00398 |
Windows Defender Download Activity |
MATCH-S00549 |
Windows Disable Antispyware Registry |
MATCH-S00538 |
Windows Firewall Rule Added |
MATCH-S00537 |
Windows Firewall Rule Deleted |
MATCH-S00536 |
Windows Firewall Rule Modified |
MATCH-S00179 |
Windows Network Sniffing |
MATCH-S00732 |
Windows Port Monitor Modification |
MATCH-S00157 |
Windows Process Name Impersonation |
MATCH-S00178 |
Windows Query Registry |
MATCH-S00533 |
Windows Security Account Manager Stopped |
LEGACY-S00171 |
Windows Service Executed from Nonstandard Execution Path |
LEGACY-S00167 |
Windows Temp Directory Access Via SMB |
MATCH-S00724 |
Windows Update Agent DLL Changed |
MATCH-S00134 |
Windows User Account Created with Abnormal Naming Convention |
MATCH-S00382 |
Winnti Pipemon Characteristics |
LEGACY-S00172 |
Write-only SNMP attempt from external |
MATCH-S00734 |
XSD Autostart Entry Modification |
MATCH-S00435 |
XSL Script Processing |
MATCH-S00222 |
ZScaler Proxy-Traffic to Malicious Categorized Domain |
THRESHOLD-S00067 |
ZeroLogon Privilege Escalation Behavior |
MATCH-S00856 |
Zoom - Account Created |
MATCH-S00857 |
Zoom - Account Deleted |
MATCH-S00858 |
Zoom - Group Admin Added |
MATCH-S00859 |
Zoom - Group Admin Deleted |
MATCH-S00860 |
Zoom - Group Changes |
MATCH-S00861 |
Zoom - Information Barrier Policy Changes |
MATCH-S00862 |
Zoom - Meeting Risk Alert |
MATCH-S00863 |
Zoom - Recording Modification |
MATCH-S00508 |
Zoom Child Process |
MATCH-S00061 |
Zscaler - Allowed Elevated Risk Score Events |
MATCH-S00919 |
chage command use on host |
MATCH-S00263 |
iOS Implant URL Pattern |
MATCH-S00880 |
macOS - Entitlement Enumeration via Xattr |
MATCH-S00883 |
macOS - Keychain Enumeration |
MATCH-S00885 |
macOS - Screen Sharing Session Established |
MATCH-S00879 |
macOS - Suspicious Osascript Execution |
CHAIN-S00016 |
macOS - Suspicious Osascript Execution and Network Activity |
MATCH-S00878 |
macOS - Suspicious Osascript Parent Execution |
MATCH-S00884 |
macOS - Suspicious Python PIP Execution |
MATCH-S00882 |
macOS - System Preference Enumeration via Security Binary |
MATCH-S00881 |
macOS - csrutil status Usage Detected |
MATCH-S00726 |
macOS Kernel Extension Load |
MATCH-S00748 |
macOS Login Items Modification |
MATCH-S00752 |
macOS Startup Items Modifications |
MATCH-S00581 |
smbexec.py Service Installation |
LEGACY-S00179 |
vpnoverdns.com DNS lookup |