Analytics contain platform-specific detection logic and represent the implementation details of a detection strategy.
| ID | Platform |
Domain
|
Detection Strategy | Description |
|---|---|---|---|---|
| AN0001 | IaaS |
Enterprise |
DET0001
|
Detects access attempts to cloud instance metadata endpoints (e.g., 169.254.169.254) from virtual machines or containerized workloads. This includes both direct access and SSRF exploitation patterns. |
| AN0002 | Windows |
Enterprise |
DET0002
|
Detects non-standard processes (e.g., PowerShell, python.exe, rundll32.exe) making outbound connections using publish/subscribe protocols (e.g., MQTT, AMQP) over non-browser, encrypted channels, often beaconing to message brokers. |
| AN0003 | Linux |
Enterprise |
DET0002
|
Detects CLI tools (e.g., mosquitto_pub, nc, python scripts) interacting with pub/sub brokers using unusual topic names, high-frequency publication rates, or obfuscated payloads to non-standard hosts. |
| AN0004 | macOS |
Enterprise |
DET0002
|
Detects osascript, curl, or custom binaries interacting with XMPP/MQTT brokers in unapproved destinations with encrypted payloads or frequent POST-like requests to broker URIs. |
| AN0005 | Network Devices |
Enterprise |
DET0002
|
Detects pub/sub traffic over unusual ports, high-frequency topic publications, and connections to known-bad or dynamic broker endpoints outside allowlisted infrastructure. |
| AN0006 | Windows |
Enterprise |
DET0003
|
Adversary uses built-in tools such as 'net user /add /domain' or PowerShell to create a domain user account. The behavior chain includes: (1) suspicious process execution on a domain controller followed by (2) user account creation event (Event ID 4720) on the same host. |
| AN0007 | Linux |
Enterprise |
DET0003
|
Adversary with access to domain management tools (e.g., |
| AN0008 | macOS |
Enterprise |
DET0003
|
macOS clients joined to AD via LDAP may script account provisioning via |
| AN0009 | Windows |
Enterprise |
DET0004
|
Abnormal modification of the PATH environment variable or registry keys controlling system paths, combined with execution of binaries named after legitimate system tools from user-writable directories. Defender correlates registry modifications, file creation of suspicious binaries, and process execution paths inconsistent with baseline system directories. |
| AN0010 | Linux |
Enterprise |
DET0004
|
User modification of the $PATH environment variable in shell configuration files or direct runtime PATH changes, followed by execution of binaries from user-controlled directories. Defender observes file edits to ~/.bashrc, ~/.profile, or /etc/paths.d and process execution resolving to unexpected binary locations. |
| AN0011 | macOS |
Enterprise |
DET0004
|
Modification of PATH or HOME environment variables through shell config files, launchctl, or /etc/paths.d entries, combined with process execution from attacker-controlled directories. Defender correlates file changes in /etc/paths.d with process execution resolving to malicious binaries. |
| AN0012 | Windows |
Enterprise |
DET0005
|
Execution of binaries where the on-disk filename does not match PE metadata such as OriginalFilename or InternalName. Often observed with renamed LOLBAS or system binaries like rundll32, powershell, or psexec. |
| AN0013 | macOS |
Enterprise |
DET0005
|
Execution of renamed or relocated native macOS utilities with uncommon names or non-default paths (e.g., renamed |
| AN0014 | Linux |
Enterprise |
DET0005
|
Execution of renamed common utilities (e.g., |
| AN0015 | Network Devices |
Enterprise |
DET0006
|
From a defender’s perspective, suspicious bridging is observed when network devices begin allowing traffic that contradicts existing segmentation or access policies. Observable behaviors include sudden modifications to ACLs or firewall rules, unusual cross-boundary traffic flows (e.g., east-west communications across separated VLANs), or simultaneous ingress/egress anomalies. Multi-event correlation is key: configuration changes on a router/firewall followed by unexpected traffic patterns, especially from unusual sources, is a strong indicator of compromise. |
| AN0016 | Windows |
Enterprise |
DET0007
|
Adversary uses nltest, PowerShell, or Win32/.NET API to enumerate domain trust relationships (via DSEnumerateDomainTrusts, GetAllTrustRelationships, or LDAP queries), followed by discovery or authentication staging. |
| AN0017 | IaaS |
Enterprise |
DET0008
|
Cloud login from atypical geolocation or user-agent string, followed by resource enumeration or infrastructure manipulation using cloud CLI/API |
| AN0018 | Identity Provider |
Enterprise |
DET0008
|
Federated login using SSO or OAuth grant to cloud control plane, followed by directory or permissions enumeration |
| AN0019 | Office Suite |
Enterprise |
DET0008
|
Login to M365 or Google Workspace from CLI tools or unexpected source IPs, followed by mailbox or document access |
| AN0020 | SaaS |
Enterprise |
DET0008
|
Remote access to third-party SaaS with OAuth or API tokens post-initial compromise, followed by sensitive data access or configuration changes |
| AN0021 | Windows |
Enterprise |
DET0009
|
Adversary manipulates dependencies/dev tools used by developers or CI: a package manager (npm/yarn/pnpm, pip/pipenv, nuget/dotnet, chocolatey/winget, maven/gradle) or a compiler/IDE downloads or restores content; files are written under project paths and execution paths (node_modules, packages, .nuget, .gradle, .m2, %AppData%\npm, %UserProfile%.cargo\bin, temp build dirs). First run of newly written components triggers scripts (preinstall/postinstall), shell/PowerShell spawning, or loader DLLs, followed by network egress to non-approved registries/CDNs. |
| AN0022 | Linux |
Enterprise |
DET0009
|
Developer or CI invokes package managers/compilers (apt/yum + build-essential, npm/yarn/pnpm, pip/pip3, gem, cargo, go, maven/gradle). These write executable or script files into PATH or project dirs and immediately execute embedded lifecycle hooks (preinstall/postinstall, setup.py, npm scripts) that spawn shells or curl/wget, followed by egress to unfamiliar registries or domains. |
| AN0023 | macOS |
Enterprise |
DET0009
|
Developer tools (Homebrew, pip, npm/yarn, Xcode builds) install or update dependencies; new Mach-O or scripts appear under /usr/local, /opt/homebrew, ~/Library/Application Support, project dirs (node_modules/.bin, venv/bin). First run spawns sh/zsh/osascript/curl and new outbound flows; Gatekeeper/AMFI may flag unsigned components. |
| AN0024 | Windows |
Enterprise |
DET0010
|
Correlates unexpected modifications to WMI event filters, scheduled task triggers, or registry autorun keys with subsequent execution of non-standard binaries by SYSTEM-level processes. |
| AN0025 | Linux |
Enterprise |
DET0010
|
Detects inotify or auditd configuration changes that monitor system files coupled with execution of script interpreters or binaries by cron or systemd timers. |
| AN0026 | macOS |
Enterprise |
DET0010
|
Correlates launchd plist modifications with subsequent unauthorized script execution or anomalous parent-child process trees involving user agents. |
| AN0027 | IaaS |
Enterprise |
DET0010
|
Monitors cloud function creation triggered by specific audit log events (e.g., IAM changes, object creation), followed by anomalous behavior from new service accounts. |
| AN0028 | SaaS |
Enterprise |
DET0010
|
Correlates Power Automate or similar logic app workflows triggered by SaaS file uploads or email rules with data forwarding or anomalous access patterns. |
| AN0029 | Office Suite |
Enterprise |
DET0010
|
Detects macros or VBA triggers set to execute on document open or close events, often correlating with embedded payloads or C2 traffic shortly after execution. |
| AN0030 | Windows |
Enterprise |
DET0011
|
Processes generating large outbound connections with disproportionate send/receive ratios, often to uncommon ports or hosts, potentially inserting meaningless data into protocol payloads. |
| AN0031 | Linux |
Enterprise |
DET0011
|
Outbound traffic with anomalous payload sizes and patterns from non-networking processes, often observed via packet inspection or connection logs. |
| AN0032 | macOS |
Enterprise |
DET0011
|
Previously unseen applications generating outbound connections with atypical data flow characteristics, such as excessive data with no return response. |
| AN0033 | ESXi |
Enterprise |
DET0011
|
Anomalous traffic from ESXi host management daemons (like hostd or vpxa) embedding non-standard payloads in management protocols (e.g., HTTPS) or beaconing behavior. |
| AN0034 | Windows |
Enterprise |
DET0012
|
Discrepancies between VBA source code and p-code inside Office documents. Defender perspective: anomalies in file metadata streams, execution of Office processes loading macros without source code consistency, and script execution with no corresponding source metadata. |
| AN0035 | Linux |
Enterprise |
DET0012
|
Execution of Wine or LibreOffice macros with inconsistent VBA metadata. Defender perspective: file analysis showing p-code embedded without matching source streams. |
| AN0036 | macOS |
Enterprise |
DET0012
|
Opening of Office files where VBA source code appears benign or missing, but p-code remains active. Defender perspective: process execution of Office apps with macro execution lacking visible source components. |
| AN0037 | Windows |
Enterprise |
DET0013
|
Access to browser artifact locations (e.g., Chrome, Edge, Firefox) by processes like PowerShell, cmd.exe, or unknown tools, followed by file reads, decoding, or export operations indicating enumeration of bookmarks, autofill, or history databases. |
| AN0038 | Linux |
Enterprise |
DET0013
|
Unauthorized shell or script-based access to browser config or SQLite history files, typically in ~/.config/google-chrome/, ~/.mozilla/, or ~/.var/app folders, indicating enumeration of bookmarks or saved credentials. |
| AN0039 | macOS |
Enterprise |
DET0013
|
Scripting or CLI tool access to ~/Library/Application Support/Google/Chrome or ~/Library/Safari bookmarks, cookies, or history databases. Detection relies on unexpected processes accessing or reading from these locations. |
| AN0040 | Windows |
Enterprise |
DET0014
|
Detects staging of sensitive files into temporary or public directories, compression with 7zip/WinRAR, or batch copy prior to exfiltration. |
| AN0041 | Linux |
Enterprise |
DET0014
|
Detects script or user activity copying files to a central temp or /mnt directory followed by archive/compression utilities. |
| AN0042 | macOS |
Enterprise |
DET0014
|
Detects files collected into user temp or shared directories followed by compression with ditto, zip, or custom scripts. |
| AN0043 | IaaS |
Enterprise |
DET0014
|
Detects virtual disk expansion or file copy operations to cloud buckets or mounted volumes from isolated instances. |
| AN0044 | ESXi |
Enterprise |
DET0014
|
Detects snapshots or data stored in VMFS volumes from root CLI or remote agents. |
| AN0045 | Windows |
Enterprise |
DET0015
|
Detects unusual command executions and service modifications that indicate self-patching or disabling of vulnerable services post-compromise. Defenders should monitor for service stop commands, suspicious process termination, and execution of binaries or scripts aligned with known patching or service management tools outside of expected admin contexts. |
| AN0046 | Linux |
Enterprise |
DET0015
|
Detects adversary attempts to monopolize control of compromised systems by issuing service stop commands, unloading vulnerable modules, or forcefully killing competing processes. Defenders should monitor audit logs and syslog for administrative utilities (systemctl, service, kill) being invoked outside of normal change management. |
| AN0047 | macOS |
Enterprise |
DET0015
|
Detects unauthorized termination of system daemons or commands issued through launchctl or kill to stop competing services or malware processes. Defenders should monitor unified logs and EDR telemetry for unusual service modifications or terminations. |
| AN0048 | Windows |
Enterprise |
DET0016
|
Adversary executes commands to enumerate installed antivirus, EDR, or firewall agents using WMI, registry queries, and built-in tools (e.g., tasklist, netsh, sc query). Correlated with elevated process privileges or scripting engine usage. |
| AN0049 | Linux |
Enterprise |
DET0016
|
Adversary runs discovery commands such as |
| AN0050 | macOS |
Enterprise |
DET0016
|
Adversary attempts to detect monitoring agents such as Little Snitch, KnockKnock, or other system daemons via process listing ( |
| AN0051 | Windows |
Enterprise |
DET0017
|
Correlated modification of AppCompat registry keys and execution of sdbinst.exe to install custom shim databases. Followed by DLL injection via shim behavior into target application processes. |
| AN0052 | Windows |
Enterprise |
DET0018
|
A process (often LOLBin or user-launched program) loads a DLL from a user-writable/UNC/Temp path or unsigned/invalid signer. Within a short window the DLL is (a) newly written to disk, (b) spawned as follow-on execution (rundll32/regsvr32), or (c) establishes outbound C2. |
| AN0053 | Linux |
Enterprise |
DET0018
|
A process loads a shared object (.so) via dlopen/LD_PRELOAD/open from non-standard or temporary locations (e.g., /tmp, /dev/shm), especially shortly after that .so is written or fetched, or linked via manipulated environment variables (LD_PRELOAD/LD_LIBRARY_PATH). |
| AN0054 | macOS |
Enterprise |
DET0018
|
A process loads a non-system .dylib/.so via dyld (dlopen/dlsym) from user-writable locations (~/Library, /tmp) or after the library was recently created/downloaded, often followed by network egress or persistence. |
| AN0055 | Windows |
Enterprise |
DET0019
|
Executable or script payloads lacking symbol information and readable strings that are created or dropped by unusual or short-lived processes. |
| AN0056 | Linux |
Enterprise |
DET0019
|
Executable or binary files created without symbol tables or with stripped sections, especially by non-user shell processes or compilers invoked outside standard dev paths. |
| AN0057 | macOS |
Enterprise |
DET0019
|
Creation of run-only AppleScripts or Mach-O binaries lacking symbol table and string references, especially when dropped by user space scripting engines or staging apps. |
| AN0058 | Network Devices |
Enterprise |
DET0019
|
Inbound binary payloads transferred over HTTP/S with compressed or encoded headers, lacking signature markers or metadata indicative of compiler/toolchain. |
| AN0059 | Linux |
Enterprise |
DET0020
|
Detects modification of shell startup/logout scripts such as ~/.bashrc, ~/.bash_profile, or /etc/profile, followed by anomalous process execution or network connections upon interactive or remote shell login. |
| AN0060 | macOS |
Enterprise |
DET0020
|
Correlates zsh shell configuration file changes (e.g., ~/.zshrc, ~/.zlogin, /etc/zprofile) with execution of unauthorized binaries or unexpected network activity triggered on Terminal.app launch. |
| AN0061 | Windows |
Enterprise |
DET0021
|
Adversary disables or stops critical services (e.g., Exchange, SQL, AV, endpoint monitoring) using native utilities or API calls, often preceding destructive actions (T1485, T1486). Behavioral chain: Elevated execution context + stop-service or sc.exe or ChangeServiceConfigW + terminated or disabled service + possible follow-up file manipulation. |
| AN0062 | Linux |
Enterprise |
DET0021
|
Adversary executes systemctl or service stop targeting high-value services (e.g., mysql, sshd), possibly followed by rm or shred against data stores. Behavioral chain: sudo/su usage + stop command + /var/log/messages or syslog entries + file access/delete. |
| AN0063 | macOS |
Enterprise |
DET0021
|
Use of launchctl to stop services or kill critical background processes (e.g., securityd, com.apple.*), typically followed by command-line tools like rm or diskutil. Behavioral chain: Terminal or remote shell + launchctl bootout/disable + process termination + follow-on modification. |
| AN0064 | ESXi |
Enterprise |
DET0021
|
Attacker disables VM-related services or stops VMs forcibly to target vmdk or logs. Behavioral chain: esxcli or vim-cmd stop + audit log showing user privilege use + datastore file manipulation. |
| AN0065 | Windows |
Enterprise |
DET0022
|
Adversary stages a lure that references a remote resource (e.g., LNK/SCF/Office template). When the user opens/renders the file or a shell enumerates icons, the host automatically attempts SMB or WebDAV authentication to the attacker host. The chain is: (1) lure file is created or modified in a user-exposed location → (2) user or system accesses the lure → (3) host makes outbound NTLM (SMB 139/445 or WebDAV over 80/443) to an untrusted destination → (4) repeated attempts from multiple users/hosts or from privileged workstations. |
| AN0066 | Windows |
Enterprise |
DET0023
|
Detection of unpacking behavior through abnormal memory allocation, followed by executable code injection and execution from non-image sections. |
| AN0067 | Linux |
Enterprise |
DET0023
|
Correlates ELF file execution with high-entropy writable memory segments and self-modifying code patterns. |
| AN0068 | macOS |
Enterprise |
DET0023
|
Detection of packed Mach-O binaries unpacking into memory and transferring control to dynamically modified code segments. |
| AN0069 | Linux |
Enterprise |
DET0024
|
Detects unauthorized access, copying, or modification of Kerberos ccache files (krb5cc_%UID% or krb5.ccache) in /tmp or custom paths defined by KRB5CCNAME. Correlates file access with suspicious processes (e.g., credential dumping tools) and subsequent anomalous Kerberos authentication requests from non-standard processes. |
| AN0070 | macOS |
Enterprise |
DET0024
|
Detects abnormal interaction with memory-based Kerberos ccache (API:{uuid}) or file-based overrides. Focus on processes attempting to enumerate or extract Kerberos tickets outside of built-in utilities. Detects use of open-source tools (e.g., Bifrost, modified Mimikatz ports) that interact with the Kerberos framework APIs. |
| AN0071 | Windows |
Enterprise |
DET0025
|
Abuse of trusted Electron apps (Teams, Slack, Chrome) to spawn child processes or execute payloads via malicious command-line arguments (e.g., --gpu-launcher) and modified app resources (.asar). Behavior chain: suspicious parent process (Electron app) → unusual command-line args → child process creation → optional DLL/network artifacts. |
| AN0072 | Linux |
Enterprise |
DET0025
|
Abuse of Linux Electron binaries by modifying app.asar or config JS files and spawning unexpected child processes (bash, curl, python). |
| AN0073 | macOS |
Enterprise |
DET0025
|
Abuse of macOS Electron apps by modifying app.asar bundles and spawning child processes (osascript, curl, sh) from Electron executables. |
| AN0074 | Windows |
Enterprise |
DET0026
|
Correlated registry modifications under Print Processors path, followed by DLL file creation within the system print processor directory, and DLL load by spoolsv.exe. Malicious execution often occurs during service restart or system boot, with SYSTEM-level privileges. |
| AN0075 | Windows |
Enterprise |
DET0027
|
Detects unexpected or high-volume HTTP/S/WebSocket communication from suspicious processes (e.g., PowerShell, rundll32) using uncommon user agents or mimicking browser traffic to unusual domains or IPs. |
| AN0076 | Linux |
Enterprise |
DET0027
|
Detects curl, wget, Python requests, or custom HTTP clients communicating over non-standard ports, with repetitive or beacon-like patterns or POST-heavy behavior to rare domains. |
| AN0077 | macOS |
Enterprise |
DET0027
|
Detects applications such as Automator, AppleScript, or LaunchDaemons invoking HTTP/S traffic to non-standard domains or using suspicious headers (e.g., Base64 in URIs or cookie fields). |
| AN0078 | ESXi |
Enterprise |
DET0027
|
Detects HTTP or HTTPS communication initiated by shell-based scripts or management daemons, especially those reaching public IPs over ports 80/443 using embedded curl or wget. |
| AN0079 | Network Devices |
Enterprise |
DET0027
|
Detects Web protocol misuse such as encoded HTTP headers, WebSocket upgrade requests with abnormal payloads, or TLS handshake anomalies suggesting embedded C2 channels. |
| AN0080 | Windows |
Enterprise |
DET0028
|
Processes invoking network-intensive child processes or uploading large data volumes, often from non-standard user or system contexts, with evidence of long-duration TCP/UDP sessions to unusual destinations. |
| AN0081 | Linux |
Enterprise |
DET0028
|
User-initiated processes generating sustained outbound traffic over common or non-standard ports, often outside business hours, potentially linked to scanning or proxyjacking. Includes curl, wget, masscan, or proxy clients. |
| AN0082 | macOS |
Enterprise |
DET0028
|
Suspicious long-lived or high-throughput connections by non-Apple signed apps or processes not commonly associated with network uploads. Detect background processes using open sockets for data egress. |
| AN0083 | Containers |
Enterprise |
DET0028
|
Containerized apps or sidecar containers generating excessive outbound traffic or being leveraged for proxy networks. Includes sudden increases in network interface stats, especially in dormant or low-util apps. |
| AN0084 | IaaS |
Enterprise |
DET0028
|
Virtual instances or workloads generating sustained outbound data rates, often to TOR, VPN, or proxy endpoints. Often coincides with unusual IAM usage or deployed scripts (e.g., cron jobs using proxy clients). |
| AN0085 | Windows |
Enterprise |
DET0029
|
Adversary uses a tool like Ruler to insert a malicious custom form into the user's Outlook mailbox. The form is designed to auto-execute on Outlook startup or on receipt of a specially crafted email. This results in child processes launched from outlook.exe and possibly network connections or payload loading. |
| AN0086 | Office Suite |
Enterprise |
DET0029
|
Outlook form execution upon message receipt or client launch results in automated code execution within user session. Form definitions deviate from standard templates and include script logic or COM object calls embedded in form fields. |
| AN0087 | IaaS |
Enterprise |
DET0030
|
Detects modifications to IAM conditions or policies that alter authentication behavior, such as adding permissive trusted IPs, removing MFA requirements, or changing regional access restrictions. Behavioral detection focuses on anomalous policy updates tied to privileged accounts and subsequent suspicious logon activity from previously blocked regions or devices. |
| AN0088 | Identity Provider |
Enterprise |
DET0030
|
Detects suspicious updates to conditional access or MFA enforcement policies in identity providers such as Entra ID, Okta, or JumpCloud. Focus is on removal of policy blocks, addition of broad exclusions, or registration of adversary-controlled MFA methods, followed by anomalous login activity that takes advantage of the modified policies. |
| AN0089 | Windows |
Enterprise |
DET0031
|
Execution of binaries with invalid digital signatures, where metadata claims code is signed but validation fails. Behavior is often correlated with suspicious parent processes or unexpected execution paths. |
| AN0090 | macOS |
Enterprise |
DET0031
|
Binaries or applications executed with tampered or unverifiable code signatures. Often tied to Gatekeeper bypasses, App Translocation, or use of unsigned launch daemons by untrusted users. |
| AN0091 | Windows |
Enterprise |
DET0032
|
Suspicious use of attrib.exe or PowerShell commands to set hidden attributes on files/directories. Defender view: processes modifying file attributes to 'hidden' or creating files with ADS (alternate data streams). |
| AN0092 | Linux |
Enterprise |
DET0032
|
Creation of files or directories with a leading '.' in privileged directories (/etc, /var, /usr/bin). Defender view: monitoring auditd logs for file creations where name begins with '.' and correlated with unusual user/process context. |
| AN0093 | macOS |
Enterprise |
DET0032
|
Use of chflags hidden or SetFile -a V commands to hide files, or creation of hidden files with leading '.'. Defender view: monitoring process execution and file metadata changes setting UF_HIDDEN attribute. |
| AN0094 | Windows |
Enterprise |
DET0033
|
Defenders can observe suspicious replacement or tampering of system accessibility binaries (e.g., utilman.exe, sethc.exe, osk.exe) and anomalous modifications to registry keys used to redirect accessibility programs (such as IFEO keys). Additionally, execution of cmd.exe or other suspicious binaries triggered from the login screen by SYSTEM can be correlated as part of a behavior chain. |
| AN0095 | Windows |
Enterprise |
DET0034
|
Identifies adversary behavior that launches commands or invokes APIs to enumerate active processes (e.g., tasklist.exe, Get-Process, or CreateToolhelp32Snapshot). Detects execution combined with parent process lineage, network session context, or remote origin. |
| AN0096 | Linux |
Enterprise |
DET0034
|
Detects execution of common process enumeration utilities (e.g., ps, top, htop) or access to /proc with suspicious ancestry. Correlates command usage with interactive shell context and user role. |
| AN0097 | macOS |
Enterprise |
DET0034
|
Monitors execution of ps, top, or launchctl with unusual parent processes or from terminal scripts. Also detects AppleScript-based process listing or |
| AN0098 | ESXi |
Enterprise |
DET0034
|
Detects process enumeration using |
| AN0099 | Network Devices |
Enterprise |
DET0034
|
Monitors CLI-based execution of |
| AN0100 | Windows |
Enterprise |
DET0035
|
Suspicious processes initiating encrypted HTTPS connections to common web service domains, followed by abnormal data upload behavior or automated posting behavior indicative of C2 bidirectional traffic. |
| AN0101 | Linux |
Enterprise |
DET0035
|
Non-interactive system processes making encrypted HTTPS connections to well-known web services followed by high outbound traffic volume or scripted upload patterns. |
| AN0102 | macOS |
Enterprise |
DET0035
|
Scripting engines (e.g., osascript, Python) initiating HTTPS requests to social media or content-sharing platforms, paired with automated response handling indicative of two-way communication. |
| AN0103 | Identity Provider |
Enterprise |
DET0036
|
Adversary registers new devices to compromised user accounts to bypass MFA or conditional access policies via Azure Entra ID, Okta, or Duo self-enrollment portals. |
| AN0104 | Windows |
Enterprise |
DET0036
|
Adversary registers a Windows device to Entra ID or bypasses conditional access by adding device via Intune registration pipeline using stolen credentials. |
| AN0105 | Windows |
Enterprise |
DET0037
|
Detects unauthorized access to web browser credential stores (e.g., Chrome Login Data, Edge Credential Locker) by processes other than the browser itself. Correlates file reads of credential databases with subsequent API calls to |
| AN0106 | Linux |
Enterprise |
DET0037
|
Detects attempts to access browser credential stores (e.g., Firefox |
| AN0107 | macOS |
Enterprise |
DET0037
|
Detects abnormal access to Safari credential stores (Keychain-backed) or Chrome/Firefox login databases. Observes processes executing |
| AN0108 | Windows |
Enterprise |
DET0038
|
Executables written or modified in installer directories (e.g., %TEMP% subdirectories or Program Files installer paths) followed by execution under elevated context. Defender observes abnormal file replacement activity, process creation by installer processes pointing to attacker-supplied binaries, and unexpected module loads in elevated processes. |
| AN0109 | Windows |
Enterprise |
DET0039
|
Correlate high-frequency or anomalous DNS query activity with processes that do not normally generate network requests (e.g., Office apps, system utilities). Detect pseudo-random or high-entropy domain lookups indicative of domain generation algorithms (DGAs). |
| AN0110 | Linux |
Enterprise |
DET0039
|
Monitor /var/log/audit/audit.log and DNS resolver logs for repeated failed lookups or connections to high-entropy domain names. Correlate suspicious DNS queries with process lineage (e.g., Python, bash, or unusual system daemons). |
| AN0111 | macOS |
Enterprise |
DET0039
|
Inspect unified logs for anomalous DNS resolutions triggered by non-network applications. Flag repeated connections to newly registered or algorithmically generated domains. Correlate with endpoint process telemetry. |
| AN0112 | ESXi |
Enterprise |
DET0039
|
Monitor esxcli and syslog records for DNS resolver changes or repeated queries to unusual external domains by management agents. Detect unauthorized changes to VM or host network settings that redirect DNS lookups. |
| AN0113 | Windows |
Enterprise |
DET0040
|
Detects adversary activity that removes persistence artifacts such as services, registry keys, scheduled tasks, user accounts, and binaries through commands like |
| AN0114 | Linux |
Enterprise |
DET0040
|
Detects removal of persistence artifacts such as crontab entries, systemd service units, and malicious user accounts through commands like |
| AN0115 | macOS |
Enterprise |
DET0040
|
Detects deletion of launch agents (~/Library/LaunchAgents/) and launch daemons (/Library/LaunchDaemons/), especially after suspicious process execution or when tied to known persistence methods. |
| AN0116 | ESXi |
Enterprise |
DET0040
|
Detects adversary removal of persistence implants (e.g., rc.local entries or crontab injections) via CLI ( |
| AN0117 | IaaS |
Enterprise |
DET0041
|
Adversary with write access to storage modifies lifecycle policies (e.g., via PutBucketLifecycle) to schedule rapid object deletion across one or more storage buckets. This is often used to trigger impact (destruction), remove logs (defense evasion), or force extortion (ransomware). |
| AN0118 | Windows |
Enterprise |
DET0042
|
Detects abuse of verclsid.exe to execute COM objects by monitoring process creation, CLSID arguments, DLLs or scriptlet engines loaded into memory, and If the CLSID points to remote SCT/HTA content, verclsid.exe makes outbound connections. |
| AN0119 | Windows |
Enterprise |
DET0043
|
Unusual process or API usage attempting to query system locale, timezone, or keyboard layout (e.g., calls to GetLocaleInfoW, GetTimeZoneInformation). Detection can be enhanced by correlating with processes not typically associated with system configuration queries, such as unknown binaries or scripts. |
| AN0120 | Linux |
Enterprise |
DET0043
|
Detection of commands accessing locale, timezone, or language settings such as 'locale', 'timedatectl', or parsing /etc/timezone. Anomalous execution by unusual users or automation scripts should be flagged. |
| AN0121 | macOS |
Enterprise |
DET0043
|
Detection of system calls or commands accessing system locale (e.g., 'defaults read -g AppleLocale', 'systemsetup -gettimezone'). Correlate with unusual parent processes or execution contexts. |
| AN0122 | IaaS |
Enterprise |
DET0043
|
Detection of queries to instance metadata services (e.g., AWS IMDS, Azure Metadata Service) for availability zone, region, or network geolocation details. Correlation with non-management accounts or non-standard workloads may indicate adversary reconnaissance. |
| AN0123 | Windows |
Enterprise |
DET0044
|
Installation of a new browser extension followed by suspicious file writes or outbound network connections to untrusted domains by the browser process. |
| AN0124 | macOS |
Enterprise |
DET0044
|
Installation of malicious .mobileconfig profiles or browser extension plist entries followed by abnormal browser child process activity. |
| AN0125 | Linux |
Enterprise |
DET0044
|
Manual or scripted installation of Chrome extensions using user scripts or config files, followed by unexpected network connections from browser processes. |
| AN0126 | Windows |
Enterprise |
DET0045
|
Inconsistencies between process command-line arguments logged at creation time and subsequent process behavior. Defender perspective: monitoring for processes launched in a suspended state, followed by memory modifications (e.g., WriteProcessMemory targeting the PEB) that overwrite arguments before execution resumes. Detection also includes observing anomalous behaviors from processes whose logged arguments do not align with executed activity (e.g., network connections, file writes, or registry modifications). |
| AN0127 | Windows |
Enterprise |
DET0046
|
Execution of discovery commands or API calls for virtualization artifacts (e.g., registry keys, device drivers, services), sleep/skipped execution behavior, or sandbox evasion DLLs before payload deployment. |
| AN0128 | Linux |
Enterprise |
DET0046
|
Execution of commands to enumerate virtualization-related files or processes (e.g., '/sys/class/dmi/id/product_name', dmesg, lscpu, lspci), or querying hypervisor interfaces prior to malware execution. |
| AN0129 | macOS |
Enterprise |
DET0046
|
Execution of scripts or binaries that check for virtualization indicators (e.g., system_profiler, ioreg -l, kextstat), combined with delay functions or anomalous launchd activity. |
| AN0130 | Windows |
Enterprise |
DET0047
|
Detection focuses on processes that attempt to locate, access, or exfiltrate local Outlook data files (.pst/.ost) using file system access, native Windows utilities (e.g., PowerShell, WMI), or remote access tools with file browsing capabilities. The behavior chain includes directory enumeration, file access, optional compression or staging, and network transfer. |
| AN0131 | Windows |
Enterprise |
DET0048
|
Detects adversaries accessing remote mail systems (e.g., Exchange Online, O365) using stolen credentials or OAuth tokens, followed by scripted access to mailbox contents via PowerShell, AADInternals, or unattended API queries. Detection focuses on abnormal logon sessions, user agents, IP locations, and scripted or tool-based email data access. |
| AN0132 | Office Suite |
Enterprise |
DET0048
|
Monitors programmatic access to user mailboxes in cloud-based email systems (e.g., O365, Exchange Online) using APIs or tokens. Focuses on OAuth misuse, suspicious MailItemsAccessed patterns, scripted keyword searches, and connections from untrusted agents or locations. |
| AN0133 | Windows |
Enterprise |
DET0049
|
Detects attempts to clear RDP/network history and modify network configuration artifacts through command execution, registry key deletion, firewall rule changes, and suspicious file deletions (e.g., Default.rdp, registry edits to Terminal Server Client keys). |
| AN0134 | Linux |
Enterprise |
DET0049
|
Detects deletion or overwriting of logs/configs that store SSH or proxy activity, such as /var/log/auth.log or custom .bash_history clearing tied to SSH sessions or firewall rule changes. |
| AN0135 | macOS |
Enterprise |
DET0049
|
Detects removal of Remote Login or Screen Sharing logs in Unified Logging, deletion of |
| AN0136 | Network Devices |
Enterprise |
DET0049
|
Detects firewall rule modifications or reset of logs/connection tables (e.g., |
| AN0137 | Windows |
Enterprise |
DET0050
|
An adversary writes or drops a malicious Office Add-in (e.g., WLL, XLL, COM) to a trusted directory or modifies registry keys to load malicious add-ins on Office application launch. Upon user opening Word or Excel, the add-in is automatically loaded, triggering execution of the payload, often spawning scripting engines or anomalous child processes. |
| AN0138 | Office Suite |
Enterprise |
DET0050
|
Malicious Office add-ins loaded via VSTO, COM, or VBA auto-load paths. Upon launch of Word/Excel/Outlook, the add-in executes code without user action. Add-in resides in trusted directory or registered via Office COM/VBE subsystem. Behavior includes unsigned add-in execution, anomalous load context, or add-in spawning interpreter process. |
| AN0139 | Windows |
Enterprise |
DET0051
|
Creation or modification of files in directories known to be excluded from AV scanning (e.g., C:\Windows\Temp, Exchange server directories, or default AV exclusions). Defender perspective: correlate file creation with execution behavior or anomalous parent processes writing to excluded paths. |
| AN0140 | Linux |
Enterprise |
DET0051
|
Adversaries writing or moving payloads into directories configured as AV/EDR exclusion paths (e.g., /tmp, /var/lib, or custom directories from auditd exclusion rules). Defender perspective: detect file creation in paths matching known exclusions correlated with unusual parent processes. |
| AN0141 | macOS |
Enterprise |
DET0051
|
Suspicious file creation or modification in directories ignored by XProtect or AV exclusions (e.g., ~/Library, temporary cache directories). Defender perspective: monitor file events in ignored paths with correlation to execution or persistence activity. |
| AN0142 | Linux |
Enterprise |
DET0052
|
Correlate command executions involving 'sudo' with elevated effective user ID (euid=0), especially when tty_tickets is disabled or timestamp_timeout is actively abused. |
| AN0143 | macOS |
Enterprise |
DET0052
|
Detect sudo activity with NOPASSWD in /etc/sudoers or disabling tty_tickets, followed by immediate privileged commands (e.g., echo 'Defaults !tty_tickets' >> /etc/sudoers). |
| AN0144 | Windows |
Enterprise |
DET0053
|
Detects excessive outbound traffic to remote host over HTTP(S) from uncommon or previously unseen processes. |
| AN0145 | Linux |
Enterprise |
DET0053
|
Identifies custom or previously unseen userland processes initiating high-volume HTTP connections with low response volume. |
| AN0146 | macOS |
Enterprise |
DET0053
|
Flags unexpected user applications initiating long-lived HTTP(S) sessions with irregular traffic patterns. |
| AN0147 | Windows |
Enterprise |
DET0054
|
Sequence of internal email sent from a recently compromised user account (preceded by abnormal logon or device activity), with attachments or links leading to execution or credential harvesting. Defender observes: internal mail delivery to peers with high entropy attachments, followed by click events, process initiation, or credential prompts. |
| AN0148 | Linux |
Enterprise |
DET0054
|
Delivery of suspicious internal communication (e.g., Thunderbird, Evolution) using compromised internal accounts. Sequence of: unexpected user activity + mail transfer logs + download or execution of attachments. |
| AN0149 | macOS |
Enterprise |
DET0054
|
Abnormal Apple Mail use, including internal email relays followed by file execution or script events (e.g., attachments launched via Preview, terminal triggered from Mail.app) |
| AN0150 | SaaS |
Enterprise |
DET0054
|
Internal spearphishing via SaaS applications (e.g., Slack, Teams, Gmail): message sent from compromised user with attachment or URL, followed by click and credential access behavior. |
| AN0151 | Office Suite |
Enterprise |
DET0054
|
Outlook or Word used to forward suspicious internal attachments with macro content. Defender observes attachment forwarding, auto-opening behaviors, or macro prompt interactions. |
| AN0152 | Windows |
Enterprise |
DET0055
|
Detection of adversary attempts to enumerate Group Policy settings through suspicious command execution (gpresult), PowerShell enumeration (Get-DomainGPO, Get-DomainGPOLocalGroup), and abnormal LDAP queries targeting groupPolicyContainer objects. Defenders observe unusual process lineage, script execution, or LDAP filter activity against domain controllers. |
| AN0153 | Windows |
Enterprise |
DET0056
|
Detection of unauthorized modifications to Windows root certificate stores by monitoring registry keys, certificate installation processes, and creation of new certificate entries not in baseline trusted lists. |
| AN0154 | Linux |
Enterprise |
DET0056
|
Detection of unexpected additions or modifications to system-wide certificate stores or execution of commands adding certificates to trusted stores. |
| AN0155 | macOS |
Enterprise |
DET0056
|
Detection of malicious certificate installation via monitoring execution of the |
| AN0156 | macOS |
Enterprise |
DET0057
|
Detects suspicious memory access attempts targeting the |
| AN0157 | Linux |
Enterprise |
DET0057
|
Detects adversaries attempting to attach debuggers or memory dump utilities to credential storage daemons analogous to macOS |
| AN0158 | Windows |
Enterprise |
DET0058
|
Detection of a process or script that accesses a common web service to retrieve content containing obfuscated indicators of a secondary C2 server (dead drop resolver behavior). |
| AN0159 | Linux |
Enterprise |
DET0058
|
Detection of a process or script that accesses a common web service to retrieve content containing obfuscated indicators of a secondary C2 server (dead drop resolver behavior). |
| AN0160 | macOS |
Enterprise |
DET0058
|
Detection of a process or script that accesses a common web service to retrieve content containing obfuscated indicators of a secondary C2 server (dead drop resolver behavior). |
| AN0161 | ESXi |
Enterprise |
DET0058
|
Detection of a process or script that accesses a common web service to retrieve content containing obfuscated indicators of a secondary C2 server (dead drop resolver behavior). |
| AN0162 | Windows |
Enterprise |
DET0059
|
Correlate unauthorized or anomalous file modifications, deletions, or metadata changes with suspicious process execution or API calls. Detect abnormal changes to structured data (e.g., database files, logs, financial records) outside expected business process activity. |
| AN0163 | Linux |
Enterprise |
DET0059
|
Detect unauthorized manipulation of log files, database entries, or system configuration files through auditd and syslog. Correlate shell commands that alter HISTFILE or data-related processes with abnormal file access patterns. |
| AN0164 | macOS |
Enterprise |
DET0059
|
Detect manipulation of system or application files in |
| AN0165 | Windows |
Enterprise |
DET0060
|
Unusual or uncommon processes initiate network connections to external destinations followed by file creation (tools downloaded). |
| AN0166 | Linux |
Enterprise |
DET0060
|
Shell-based tools (curl, wget, scp) initiate connections to external domains followed by creation of executable files on disk. |
| AN0167 | macOS |
Enterprise |
DET0060
|
Process execution of curl or wget followed by a network connection and a file created in temporary or user-specific directories. |
| AN0168 | ESXi |
Enterprise |
DET0060
|
Command line interface or vCLI triggers remote transfer using wget or curl, writing files into datastore paths or local tmp directories. |
| AN0169 | Network Devices |
Enterprise |
DET0060
|
Network device logs show anomalous inbound file transfers or uncharacteristic flows with high payload volume to network devices with storage or automation hooks. |
| AN0170 | Windows |
Enterprise |
DET0061
|
Detects modification of registry keys used for default file handlers, followed by anomalous process execution from user-initiated file opens. This includes tracking changes under HKCU and HKCR for file extension mappings, and correlating them with new or suspicious handler paths launching unusual child processes (e.g., PowerShell, cmd, wscript). |
| AN0171 | Linux |
Enterprise |
DET0062
|
Disabling or modifying the Linux Audit system through process termination (auditd killed), service management (systemctl stop auditd), or tampering with rule/configuration files (/etc/audit/audit.rules, audit.conf). Defender view: suspicious execution of auditctl/systemctl commands, file modifications to audit rules, or sudden absence of audit logs correlated with privileged execution. |
| AN0172 | Windows |
Enterprise |
DET0063
|
Detects Python execution via python.exe or py.exe with anomalous parent lineage (e.g., Office macros, LOLBAS), execution from unusual directories, or chained network/PowerShell/system-level activity. |
| AN0173 | macOS |
Enterprise |
DET0063
|
Detects native Python or framework-based execution from Terminal, embedded apps, or launchd jobs. Flags network calls, persistence writes, or system enumeration after Python launch. |
| AN0174 | Linux |
Enterprise |
DET0063
|
Detects Python execution from non-standard user contexts or cron jobs that invoke outbound traffic, access sensitive files, or perform process injection (e.g., ptrace or /proc memory maps). |
| AN0175 | ESXi |
Enterprise |
DET0063
|
Detects Python script or interpreter execution on ESXi hosts via embedded BusyBox shells, nested installations, or dropped files via SSH or datastore mount. Flags unusual scripting or post-compromise enumeration behavior. |
| AN0176 | Windows |
Enterprise |
DET0064
|
Unquoted service or shortcut paths that contain spaces and allow path interception by higher-level executables. Defender observes registry service configurations with unquoted paths, file creation of executables in parent directories of unquoted paths, and subsequent process execution from unexpected locations. |
| AN0177 | Containers |
Enterprise |
DET0065
|
Defenders may detect abuse of container administration commands by observing anomalous use of management utilities ( |
| AN0178 | Windows |
Enterprise |
DET0066
|
Behavioral chain: (1) a user-facing app (browser/Office/email client) launches a URL or handles a link, then (2) the same process lineage makes an outbound connection to an untrusted domain/IP, (3) a file is downloaded or unpacked to a user-writable location shortly after the click. Optional enrichment: subsequent child execution by LOLBINs. |
| AN0179 | Linux |
Enterprise |
DET0066
|
Behavioral chain: (1) browser/office/GUI mail client opens a URL, (2) outbound connection to untrusted domain, (3) a new file is saved in $HOME/Downloads, /tmp, or cache immediately after. |
| AN0180 | macOS |
Enterprise |
DET0066
|
Behavioral chain: (1) Safari/Chrome/Firefox/Office handles a URL; unified logs show open/click or LSQuarantine assignment, (2) outbound connection to untrusted domain, (3) a new file appears in ~/Downloads or /private/var/folders/* with quarantine flag. |
| AN0181 | Linux |
Enterprise |
DET0067
|
Execution of processes using nohup or shell redirection to ignore SIGHUP and continue running after session termination. Defender perspective: correlation between commands including nohup, disowned jobs, or |
| AN0182 | Windows |
Enterprise |
DET0067
|
PowerShell or script execution with parameters that suppress errors or ignore user interrupts, such as |
| AN0183 | macOS |
Enterprise |
DET0067
|
Use of nohup, disown, or AppleScript constructs to suppress process interrupts. Defender perspective: commands containing nohup or hidden background tasks ( |
| AN0184 | Windows |
Enterprise |
DET0068
|
Adversary installs or modifies IIS components (ISAPI filters, extensions, or modules) using DLL files registered via configuration changes or administrative tools like AppCmd.exe. These components intercept or manipulate HTTP requests/responses for persistence or C2. |
| AN0185 | Windows |
Enterprise |
DET0069
|
Chain: (1) a new external device is recognized by Windows (USB/Thunderbolt/PCIe) or a new block device appears; (2) within a short window, the same user/session spawns processes or the OS mounts a new volume; (3) optional follow-on activity such as HID keystroke injection, DMA driver load, or new network interface MAC on DHCP. Correlate Security EID 6416 / Kernel-PnP with sysmon and DHCP/network metadata. |
| AN0186 | Linux |
Enterprise |
DET0069
|
Chain: (1) udev / kernel logs show hot-plug (USB/Thunderbolt/PCIe); (2) block device created by udisks/diskarbitration; (3) optional: new network interface or DHCP lease observed. Correlate /var/log/messages|syslog, auditd SYSCALL open/creat on /dev, and DHCP/Zeek. |
| AN0187 | macOS |
Enterprise |
DET0069
|
Chain: (1) unified logs report IOUSBHost/IOThunderbolt device arrival; (2) diskarbitrationd attaches a new volume; (3) optional: config profile manipulation or new network interface MAC obtains a lease. Correlate unifiedlogs (subsystems: IOUSBHost, IOKit, diskarbitrationd), FSEvents, and DHCP/Zeek. |
| AN0188 | Windows |
Enterprise |
DET0070
|
Unusual inbound email activity where attachments or embedded URLs are delivered to users followed by execution of new processes or suspicious document behavior. Detection involves correlating email metadata, file creation, and network activity after a phishing message is received. |
| AN0189 | Linux |
Enterprise |
DET0070
|
Monitor for malicious payload delivery through phishing where attachments or URLs in email clients (e.g., Thunderbird, mutt) result in unusual file creation or outbound network connections. Focus on correlation between mail logs, file writes, and execution activity. |
| AN0190 | macOS |
Enterprise |
DET0070
|
Detection of phishing through anomalous Mail app activity, such as attachments saved to disk and immediately executed, or Safari/Preview launching URLs and files linked from email messages. Correlate UnifiedLogs events with subsequent process execution. |
| AN0191 | Office Suite |
Enterprise |
DET0070
|
Phishing via Office documents containing embedded macros or links that spawn processes. Detection relies on correlating Office application logs with suspicious child process execution and outbound network connections. |
| AN0192 | Identity Provider |
Enterprise |
DET0070
|
Phishing attempts targeting IdPs often manifest as anomalous login attempts from suspicious email invitations or fake SSO prompts. Detection correlates login flows, MFA bypass attempts, and anomalous geographic patterns following phishing email delivery. |
| AN0193 | SaaS |
Enterprise |
DET0070
|
Phishing delivered via SaaS services (chat, collaboration platforms) where messages contain malicious URLs or attachments. Detect anomalous link clicks, suspicious file uploads, or token misuse after SaaS-based phishing attempts. |
| AN0194 | Windows |
Enterprise |
DET0071
|
Detects file transfers or mounting operations from remote hosts followed by write actions into a local staging directory, often using SMB or remote shell activity. |
| AN0195 | Linux |
Enterprise |
DET0071
|
Detects inbound SCP, rsync, or NFS mounts from remote systems followed by aggregation of files into known staging paths like /mnt/staging or /var/tmp. |
| AN0196 | macOS |
Enterprise |
DET0071
|
Detects rsync or scp inbound from other hosts that then aggregate content into /Users/Shared or /private/tmp, often involving compressed files or scripts. |
| AN0197 | ESXi |
Enterprise |
DET0071
|
Detects remote writes or snapshots mounted from other systems into a central ESXi VMFS path or NFS store used for remote staging of files before exfiltration. |
| AN0198 | IaaS |
Enterprise |
DET0071
|
Detects remote write activity across cloud VMs or object storage buckets within the same region/account that correlate with data aggregation across hosts. |
| AN0199 | Windows |
Enterprise |
DET0072
|
Detects adversary use of logon script configuration via Group Policy or user object attributes, followed by script execution post-authentication. Behavior includes modification of script path or file, then process execution under user logon context. |
| AN0200 | Linux |
Enterprise |
DET0073
|
Abuse of systemctl to execute commands or manage systemd services. Defender perspective: correlate suspicious service creation or modification with execution of systemctl subcommands such as start, enable, or status. Detect cases where systemctl is used to load services from unusual locations (e.g., /tmp, /dev/shm) or where new service units are created outside of expected administrative workflows. |
| AN0201 | IaaS |
Enterprise |
DET0074
|
Anomalous access to cloud web applications using session tokens without corresponding MFA/credential validation, often from unusual locations or device fingerprints. |
| AN0202 | SaaS |
Enterprise |
DET0074
|
Session cookie reuse on unmanaged browsers, devices, or client types deviating from user baseline (e.g., switching from Chrome to curl). |
| AN0203 | Office Suite |
Enterprise |
DET0074
|
Web session tokens reused in native Office apps (e.g., Outlook, Teams) without associated token refresh or login behavior on the endpoint. |
| AN0204 | Windows |
Enterprise |
DET0075
|
Anomalous process (e.g., |
| AN0205 | Linux |
Enterprise |
DET0075
|
|
| AN0206 | macOS |
Enterprise |
DET0075
|
Execution of AppleScript or Automator services launching |
| AN0207 | ESXi |
Enterprise |
DET0075
|
ESXi shell execution of tools/scripts ( |
| AN0208 | Network Devices |
Enterprise |
DET0075
|
Configuration of internal NAT or proxy rules that redirect traffic between client segments internally (e.g., site-to-site port forwarding). Often used to relay internal beaconing or move traffic laterally through trust zones. |
| AN0209 | Windows |
Enterprise |
DET0076
|
Detects execution of VB-based scripts or macros (VBS/VBA/VBScript) through cscript.exe/wscript.exe, Office-based process chains, or HTA usage. Focuses on chained behavior: Office or HTML container spawns script host > script host spawns PowerShell, network connections, or process injection. |
| AN0210 | macOS |
Enterprise |
DET0076
|
Detects embedded or emulated VBScript/VBA execution via Wine-based apps, Office for Mac abusing cross-platform .NET features, or macros dropped and invoked via AppleScript or third-party automation tools. |
| AN0211 | Linux |
Enterprise |
DET0076
|
Detects abuse of Mono/.NET Core environments to execute VB-like scripts, often in environments with Office emulation or WINE. Focus is on rare invocations of scripting hosts like mono.exe or .NET shells, often seen in spam filtering or forensic labs with Office support. |
| AN0212 | Windows |
Enterprise |
DET0077
|
Execution of file transfer or network access activity through non-primary interfaces (e.g., WiFi, Bluetooth, cellular) by processes not typically associated with such behavior (e.g., rundll32, powershell, regsvr32). |
| AN0213 | Linux |
Enterprise |
DET0077
|
Use of |
| AN0214 | macOS |
Enterprise |
DET0077
|
AppleScript or system calls to activate WiFi/Bluetooth interfaces ( |
| AN0215 | IaaS |
Enterprise |
DET0078
|
Detects adversarial use of cloud APIs for command execution, resource control, or reconnaissance. Focuses on CLI/SDK/scripting language abuse via stolen credentials or in-browser Cloud Shells. Monitors for anomalous API calls chained with authentication context shifts (e.g., stolen token -> privileged action) and cross-service impacts. |
| AN0216 | Windows |
Enterprise |
DET0079
|
Detection of anomalous RDP or remote service session activity where a logon session is hijacked rather than newly created. Indicators include mismatched user credentials vs. active session tokens, service session takeovers without corresponding successful logon events, or RDP shadowing activity without user consent. |
| AN0217 | Linux |
Enterprise |
DET0079
|
Detection of SSH/Telnet session hijacking via discrepancies between authentication logs and active session tables. Adversary behavior includes reusing or stealing active PTY sessions, attaching to screen/tmux, or issuing commands without corresponding login events. |
| AN0218 | macOS |
Enterprise |
DET0079
|
Detection of hijacked VNC or SSH sessions on macOS where adversaries take over an existing session rather than authenticating directly. Indicators include process execution from active sessions without new logon events, manipulation of TTY sessions, or anomalous network activity tied to dormant sessions. |
| AN0219 | Windows |
Enterprise |
DET0080
|
Adversary sends crafted HTTP/S (or other service) input to an Internet-facing app (IIS/ASP.NET, API, device portal). Chain: (1) abnormal request patterns to public endpoint → (2) elevated 4xx/5xx or unusual methods/paths → (3) server process (w3wp.exe/other service) spawns shell/LOLbins or loads non-standard modules → (4) optional outbound callback from the host/container. |
| AN0220 | Linux |
Enterprise |
DET0080
|
Adversary exploits Apache/Nginx/app servers. Chain: (1) suspicious requests in access logs → (2) spike of 5xx or WAF blocks → (3) web server or interpreter (apache2/nginx/php-fpm/node/python) spawns /bin/sh, curl, wget, socat, or writes webshell → (4) outbound callback. |
| AN0221 | macOS |
Enterprise |
DET0080
|
Adversary targets macOS-hosted public services (e.g., nginx, node). Chain: suspicious inbound request → service crash/5xx → service spawns shell or writes file → new outbound connection. |
| AN0222 | Containers |
Enterprise |
DET0080
|
Adversary exploits containerized app via ingress or service. Chain: (1) suspicious request in ingress/app logs → (2) container process spawns a shell/exec/sidecar (kubectl exec/docker exec) → (3) egress to Internet or metadata service (169.254.169.254). |
| AN0223 | IaaS |
Enterprise |
DET0080
|
Adversary targets cloud-hosted public endpoints. Chain: (1) ALB/ELB/Cloud LB logs show exploit-like inputs or error spikes → (2) workload spawns shell or reaches metadata API → (3) egress to new external hosts. |
| AN0224 | ESXi |
Enterprise |
DET0080
|
Adversary exploits exposed OpenSLP on ESXi or vCenter public endpoints. Chain: inbound request pattern to mgmt service → hostd/vpxd error/crash/restart → unexpected process behavior or datastore access → outbound callback. |
| AN0225 | Network Devices |
Enterprise |
DET0080
|
Adversary exploits public admin services on routers/firewalls/switches. Chain: anomalous HTTP/SNMP/SmartInstall inputs → device syslog errors/restarts → config changes/CLI spawn → egress to attacker C2. |
| AN0226 | Windows |
Enterprise |
DET0081
|
Execution of trusted, Microsoft-signed binaries such as |
| AN0227 | Linux |
Enterprise |
DET0081
|
Execution of trusted system binaries (e.g., |
| AN0228 | macOS |
Enterprise |
DET0081
|
Use of system binaries such as |
| AN0229 | Windows |
Enterprise |
DET0082
|
Adversary modifies internal UI messages (e.g., login banners, desktop wallpapers) or hosted intranet web pages by creating or altering content files using scripts or unauthorized access. Often preceded by privilege escalation or web shell deployment. |
| AN0230 | Linux |
Enterprise |
DET0082
|
Adversary leverages root or sudo access to alter system banners, web content directories (e.g., /var/www/html), or login configurations (/etc/issue). File creation or overwrites may coincide with suspicious script execution or cron job activity. |
| AN0231 | macOS |
Enterprise |
DET0082
|
Modification of user desktop backgrounds, login screen messages, or system banners by adversaries using admin privileges or script execution. May coincide with tampering in /Library/Desktop Pictures/ or use of AppleScript. |
| AN0232 | ESXi |
Enterprise |
DET0082
|
Adversary modifies ESXi host login banner or MOTD file (/etc/motd), either through SSH or host console access. May involve configuration file overwrite or API calls from compromised vSphere clients. |
| AN0233 | Containers |
Enterprise |
DET0083
|
Execution of container orchestration commands (e.g., |
| AN0234 | IaaS |
Enterprise |
DET0084
|
Defenders can detect suspicious cloud instance deletions by correlating events across authentication, instance lifecycle, and account activity. From a defender’s perspective, behaviors of interest include instances deleted shortly after creation, deletions initiated by new or rarely used accounts, deletions following snapshot creation, and deletions originating from anomalous geolocations or access keys. These may indicate adversarial attempts to destroy forensic evidence or evade detection. |
| AN0235 | Windows |
Enterprise |
DET0085
|
An adversary running with SYSTEM-level privileges executes commands or accesses registry keys to dump the SAM hive or directly reads sensitive local files from the config directory. This behavior often involves sequential access to HKLM\SAM, HKLM\SYSTEM, and creation of .save or .dmp files, enabling offline hash extraction. |
| AN0236 | Windows |
Enterprise |
DET0086
|
Monitor for creation of WMI EventFilter, EventConsumer, and FilterToConsumerBinding objects through WMI or MOF file execution. Detect command-line execution of |
| AN0237 | Windows |
Enterprise |
DET0087
|
Detection of processes that load or decode encrypted/encoded files in memory and subsequently execute or inject them, indicating payload unpacking or memory-resident malware. |
| AN0238 | Linux |
Enterprise |
DET0087
|
Detection of suspicious use of shell utilities or scripts that decode or decrypt a payload and execute it without writing to disk. |
| AN0239 | macOS |
Enterprise |
DET0087
|
Detection of encoded payloads being decoded and executed in-memory using scripting tools or third-party decoders. |
| AN0240 | Windows |
Enterprise |
DET0088
|
Defender observes execution of commands like |
| AN0241 | Linux |
Enterprise |
DET0088
|
Defender observes use of CLI tools ( |
| AN0242 | macOS |
Enterprise |
DET0088
|
Defender detects execution of |
| AN0243 | Windows |
Enterprise |
DET0089
|
Monitors suspicious usage of Windows API calls like SetWindowsHookEx, GetKeyState, or polling functions within non-UI service processes, combined with Registry or driver modifications. |
| AN0244 | Linux |
Enterprise |
DET0089
|
Detects non-system processes accessing /dev/input/* or issuing ptrace/evdev syscalls used for reading keystroke buffers directly. |
| AN0245 | macOS |
Enterprise |
DET0089
|
Detects unauthorized TCC access or use of Quartz Event Services (CGEventTapCreate) or IOHID for event tap installation within unexpected processes. |
| AN0246 | Network Devices |
Enterprise |
DET0089
|
Keylogging on legacy network devices via unauthorized system image modification or remote capture of console keystrokes (telnet, SSH) through altered firmware or man-in-the-middle key sniffing. |
| AN0247 | Windows |
Enterprise |
DET0090
|
Behavioral sequence where removable media is mounted, files are written/updated, and subsequently read/executed on a separate host, suggesting removable-media relay communication. |
| AN0248 | Linux |
Enterprise |
DET0090
|
Detection of file write-access to USB-mount directories (e.g., /media/, /run/media/) followed by same-file access or execution on another host. |
| AN0249 | macOS |
Enterprise |
DET0090
|
Correlates removable volume mounts (disk arbitration) with file I/O events on that volume, followed by same file execution shortly after insert. |
| AN0250 | Windows |
Enterprise |
DET0091
|
Behavioral chain involving suspicious use of GetProcAddress and LoadLibrary following memory allocation and manual mapping, often paired with low entropy strings, abnormal API use without static import tables, or delayed module load behaviors. |
| AN0251 | Windows |
Enterprise |
DET0092
|
Installation or execution of a malicious browser or IDE extension, followed by abnormal registry entries or outbound network connections from the host application |
| AN0252 | macOS |
Enterprise |
DET0092
|
Installation of configuration profiles or plist entries associated with malicious or unauthorized browser extensions |
| AN0253 | Linux |
Enterprise |
DET0092
|
Manual or script-based installation of extension-like modules into browser config directories or IDE plugin paths, followed by suspicious network activity |
| AN0254 | Windows |
Enterprise |
DET0093
|
Adversary launches built-in system tools (e.g., whoami, query user, net user) or scripts that enumerate user account information via local execution or remote API queries (e.g., WMI, PowerShell). |
| AN0255 | Linux |
Enterprise |
DET0093
|
Adversary runs commands like |
| AN0256 | macOS |
Enterprise |
DET0093
|
Adversary uses |
| AN0257 | Network Devices |
Enterprise |
DET0093
|
Adversary executes CLI commands like |
| AN0258 | Windows |
Enterprise |
DET0094
|
Detects creation or modification of scheduled tasks using schtasks.exe, at.exe, or COM objects followed by execution of outlier processes tied to the scheduled job. |
| AN0259 | Linux |
Enterprise |
DET0094
|
Detects creation or modification of cron jobs via crontab, /etc/cron.* directories, or systemd timer units with execution by unusual users or non-standard intervals. |
| AN0260 | macOS |
Enterprise |
DET0094
|
Detects creation or alteration of LaunchAgents or LaunchDaemons with corresponding plist modification followed by execution of associated binaries. |
| AN0261 | Containers |
Enterprise |
DET0094
|
Detects unusual use of |
| AN0262 | ESXi |
Enterprise |
DET0094
|
Detects modification of ESXi cron jobs, local.sh scripts, or scheduled API calls to persist custom binaries or shell scripts. |
| AN0263 | Windows |
Enterprise |
DET0095
|
Adversary uses a tool like Ruler or MFCMapi to create a malicious Outlook rule that triggers execution upon receipt of a crafted email. On email delivery, Outlook executes the rule, resulting in code execution (e.g., launching mshta.exe or PowerShell). Outlook spawns a non-standard child process, often unsanctioned, without user interaction. |
| AN0264 | Office Suite |
Enterprise |
DET0095
|
Adversary adds a new Outlook rule with modified or obfuscated PR_RULE_MSG_NAME and PR_RULE_MSG_PROVIDER attributes using MFCMapi or Ruler. Rule is triggered when email arrives, executing embedded or external code. Mailbox audit logs or Unified Audit Log shows automated rule-triggered action without user interaction. |
| AN0265 | Windows |
Enterprise |
DET0096
|
Account attribute changes (e.g., password set, group membership, servicePrincipalName, logon hours) correlated with unusual process lineage or timing, indicating privilege escalation or persistence via valid accounts. |
| AN0266 | Linux |
Enterprise |
DET0096
|
Use of native tools or scripting (e.g., |
| AN0267 | macOS |
Enterprise |
DET0096
|
Modifications to user accounts via |
| AN0268 | Identity Provider |
Enterprise |
DET0096
|
Modifications to SSO/SAML user attributes (e.g., |
| AN0269 | ESXi |
Enterprise |
DET0096
|
Addition of new users or changes to role permissions (e.g., ReadOnly -> Admin) via API or vSphere Client, particularly from non-jumpbox IPs. |
| AN0270 | SaaS |
Enterprise |
DET0096
|
Role escalation (e.g., Editor → Owner) in cloud collaboration tools (Google Workspace, O365) or file sharing apps to maintain elevated access. |
| AN0271 | Windows |
Enterprise |
DET0097
|
Processes using Win32 API calls (e.g., EnumWindows, GetForegroundWindow) or scripting tools (e.g., PowerShell, VBScript) to enumerate open windows. These often appear with reconnaissance or data collection TTPs. |
| AN0272 | Linux |
Enterprise |
DET0097
|
Scripted or binary usage of X11 utilities (e.g., xdotool, wmctrl) or direct /proc/*/window mappings to discover open GUI windows and active desktops. |
| AN0273 | macOS |
Enterprise |
DET0097
|
Processes that utilize AppleScript, |
| AN0274 | Windows |
Enterprise |
DET0098
|
Behavioral chain: (1) An actor creates or modifies a BITS job via bitsadmin.exe, PowerShell BITS cmdlets, or COM; (2) the job performs HTTP(S)/SMB network transfers while the owning user is logged on; (3) upon job completion/error, BITS launches a notify command (SetNotifyCmdLine) from svchost.exe -k netsvcs -s BITS, often establishing persistence by keeping long-lived jobs. The strategy correlates process creation, command/script telemetry, BITS-Client operational events, and network connections initiated by BITS. |
| AN0275 | Windows |
Enterprise |
DET0099
|
Unexpected write operations to BIOS/UEFI firmware regions or EFI boot partitions that do not correlate with legitimate vendor firmware updates. API calls or utilities such as fwupdate.exe or vendor flash tools executed from non-administrative or non-IT management accounts. Suspicious raw disk writes targeting System Firmware GUID partitions followed by abnormal reboot sequences. |
| AN0276 | Network Devices |
Enterprise |
DET0099
|
Unauthorized firmware uploads to routers, switches, or firewalls via TFTP/FTP/SCP. Logs showing boot variable or startup image path changes redirecting to non-standard firmware images. Abnormal reboots or firmware rollback attempts following configuration modification events. |
| AN0277 | Windows |
Enterprise |
DET0100
|
Detects malicious injection behavior involving memory allocation, remote thread queuing via APC (e.g., QueueUserAPC), and altered thread context within another live process to execute unauthorized code under legitimate context. |
| AN0278 | Windows |
Enterprise |
DET0101
|
Detects execution of Lua interpreters or scripts (.lua), especially when correlated with suspicious parent processes or file drop events, indicating malicious use of embedded scripting. |
| AN0279 | Linux |
Enterprise |
DET0101
|
Detects invocation of lua or luajit interpreters by users or services outside of expected packages, chained with script drop or memory artifacts. |
| AN0280 | macOS |
Enterprise |
DET0101
|
Detects Lua script execution via native or 3rd party interpreters, chained with unsigned binaries or unexpected parent lineage. |
| AN0281 | Network Devices |
Enterprise |
DET0101
|
Detects embedded Lua interpreter execution or script injection on devices supporting Lua scripting (e.g., routers, firewalls), often seen in modified firmware or abused APIs. |
| AN0282 | Windows |
Enterprise |
DET0102
|
Monitors for abnormal process behavior and API calls like SetWindowsHookEx, GetAsyncKeyState, or device input polling commonly used for keystroke logging. |
| AN0283 | Linux |
Enterprise |
DET0102
|
Detects use of tools/scripts accessing input devices like /dev/input/* or evdev via suspicious processes lacking GUI context. |
| AN0284 | macOS |
Enterprise |
DET0102
|
Monitors for TCC-bypassing or unauthorized access to input services like IOHIDSystem or Quartz Event Services used in keylogging or screen monitoring. |
| AN0285 | Network Devices |
Enterprise |
DET0102
|
Detects web-based credential phishing by analyzing traffic to suspicious URLs that mimic login portals and POST credential content. |
| AN0286 | Windows |
Enterprise |
DET0103
|
Detects network share disconnection attempts using command-line tools like |
| AN0287 | Windows |
Enterprise |
DET0104
|
Detects modification of LSASS and authentication DLLs, suspicious registry changes to password filter packages, and abnormal process access to lsass.exe. Correlates registry modifications, DLL loads, and process handle access events. |
| AN0288 | Linux |
Enterprise |
DET0104
|
Detects modification of PAM configuration files, unauthorized new PAM modules, and suspicious process execution accessing PAM-related binaries. Correlates file modification events in /etc/pam.d/ with process execution of unauthorized binaries. |
| AN0289 | macOS |
Enterprise |
DET0104
|
Detects unauthorized additions or changes to /Library/Security/SecurityAgentPlugins and suspicious process activity attempting to hook authentication APIs. Correlates file modifications with abnormal plugin loads in authentication flows. |
| AN0290 | Identity Provider |
Enterprise |
DET0104
|
Detects suspicious configuration changes in IdP authentication flows such as enabling reversible password encryption, MFA bypass, or policy weakening. Correlates policy modification events with unusual administrative activity. |
| AN0291 | IaaS |
Enterprise |
DET0104
|
Detects unauthorized changes to IAM authentication configurations such as disabling MFA, creating backdoor access keys, or altering trust policies. Correlates identity policy updates with unusual login behavior. |
| AN0292 | Windows |
Enterprise |
DET0105
|
Use of hash-cracking tools (e.g., John the Ripper, Hashcat) after credential dumping, combined with high CPU usage or GPU invocation via unsigned binaries accessing password hash files |
| AN0293 | Linux |
Enterprise |
DET0105
|
Execution of hash cracking binaries or scripts (e.g., john, hashcat) following access to shadow file or dumped hashes |
| AN0294 | macOS |
Enterprise |
DET0105
|
Unsigned or scripting-based processes invoking password cracking binaries or accessing hashed credential artifacts post-login |
| AN0295 | Identity Provider |
Enterprise |
DET0105
|
Sudden valid logins from accounts that previously had credentials dumped but had not authenticated successfully in the past; correlated with timeline of suspected hash cracking |
| AN0296 | Network Devices |
Enterprise |
DET0105
|
Offline cracking inferred by subsequent successful CLI or web-based authentications into routers or switches from previously dumped accounts |
| AN0297 | Windows |
Enterprise |
DET0106
|
Detects PE injection through a behavioral sequence where one process opens (OpenProcess) a handle to another, allocates remote memory (VirtualAllocEx), writes a PE header (MZ) or shellcode (WriteProcessMemory), then initiates a new thread (CreateRemoteThread or NtCreateThreadEx) in that process—executing injected code in memory without touching disk. Optional: injects a trampoline or shellcode that unpacks/reflectively maps the payload. |
| AN0298 | Windows |
Enterprise |
DET0107
|
Correlation of inbound emails with embedded links followed by user-driven browser navigation to suspicious or obfuscated domains. Detection chain includes malicious URL in email → user click recorded in Office logs → browser process spawning unusual child processes (e.g., PowerShell, cmd) or download activity. |
| AN0299 | Linux |
Enterprise |
DET0107
|
Detection of spearphishing links through mail logs and browser activity. Behavior includes email with suspicious URLs → user click recorded in mail/web proxy logs → shell or interpreter launched from browser process. |
| AN0300 | macOS |
Enterprise |
DET0107
|
Correlation of Mail.app logs with Safari/Chrome activity. Suspicious behavior includes email links → Safari/Chrome accessing newly registered or lookalike domains → osascript or Terminal spawned unexpectedly. |
| AN0301 | Identity Provider |
Enterprise |
DET0107
|
Detection of OAuth consent phishing or malicious login attempts initiated through spearphishing links. Behavior chain includes inbound email with OAuth URL → consent page visited → unusual token grants logged in IdP logs. |
| AN0302 | Windows |
Enterprise |
DET0108
|
Atypical processes (e.g., powershell.exe, regsvr32.exe) encode large outbound traffic using Base64 or other character encodings; this traffic is sent over uncommon ports or embedded in protocol fields (e.g., HTTP cookies or headers). |
| AN0303 | Linux |
Enterprise |
DET0108
|
Custom scripts or processes encode outbound traffic using gzip, Base64, or hex prior to exfiltration via curl, wget, or custom sockets. Encoding typically occurs before or during outbound connections from non-network daemons. |
| AN0304 | macOS |
Enterprise |
DET0108
|
Processes use built-in encoding utilities (e.g., |
| AN0305 | ESXi |
Enterprise |
DET0108
|
ESXi daemons (e.g., hostd, vpxa) are wrapped or impersonated to send large outbound traffic using gzip/Base64 encoding over SSH or HTTP. These actions follow suspicious logins or shell access. |
| AN0306 | macOS |
Enterprise |
DET0109
|
Monitor for unexpected modifications of plist files in persistence or configuration directories (e.g., ~/Library/LaunchAgents, ~/Library/Preferences, /Library/LaunchDaemons). Detect when modifications are followed by execution of new or unexpected binaries. Track use of utilities such as defaults, plutil, or text editors making changes to Info.plist files. Correlate file modifications with subsequent process launches or service starts that reference the altered plist. |
| AN0307 | Linux |
Enterprise |
DET0110
|
Correlation of chmod operations setting setuid/setgid bits followed by privileged process execution (EUID != UID), especially from user-writable or abnormal paths. |
| AN0308 | macOS |
Enterprise |
DET0110
|
Observation of chmod commands setting setuid/setgid bits, paired with launch of binaries under elevated execution context (e.g., root-owned binaries launched by unprivileged users). |
| AN0309 | Office Suite |
Enterprise |
DET0111
|
Detection correlates message events in email and collaboration tools (e.g., Outlook, Teams) that contain regex-like patterns resembling credentials, API keys, or tokens. Anomalous forwarding or bulk copy activity of chat/email content containing secrets is flagged. Suspicious behavior includes users pasting secrets into direct messages or attaching config files with passwords. |
| AN0310 | SaaS |
Enterprise |
DET0111
|
Detection monitors SaaS collaboration tools (e.g., Slack, Zoom, Jira) for messages or files containing credential-like patterns, or for suspicious API calls retrieving bulk chat histories by non-admin users. Identifies adversary behavior chains where chat logs are queried via APIs or integration bots to systematically extract sensitive material. |
| AN0311 | Windows |
Enterprise |
DET0112
|
Monitoring modification and execution of user or system logon scripts such as in registry Run keys or startup folders. |
| AN0312 | Linux |
Enterprise |
DET0112
|
Detection of changes or execution of shell initialization scripts like .bashrc, .profile, or /etc/profile for persistence. |
| AN0313 | macOS |
Enterprise |
DET0112
|
Monitoring for modification and execution of login hook scripts or LaunchAgents/LaunchDaemons used for persistence. |
| AN0314 | ESXi |
Enterprise |
DET0112
|
Detection of modification to ESXi rc.local.d or rc scripts that are used to execute on boot. |
| AN0315 | Network Devices |
Enterprise |
DET0112
|
Detection of changes to device startup-config files that include boot scripts or scheduled execution routines. |
| AN0316 | Windows |
Enterprise |
DET0113
|
Detects AS-REP roasting attempts by monitoring for Kerberos AS-REQ/AS-REP authentication patterns where preauthentication is disabled (Event ID 4768 with Pre-Auth Type 0). Correlates these requests with subsequent service ticket activity (Event ID 4769) and anomalies such as requests using weak RC4 encryption (etype 0x17). Excessive enumeration of accounts with 'Do not require Kerberos preauthentication' set in Active Directory is another key detection point. |
| AN0317 | Windows |
Enterprise |
DET0114
|
Detects attempts to enumerate local groups via Net.exe, PowerShell, or native API calls that precede lateral movement or privilege abuse. |
| AN0318 | Linux |
Enterprise |
DET0114
|
Detects enumeration of local groups using common binaries (groups, getent, cat /etc/group) or scripting with suspicious lineage. |
| AN0319 | macOS |
Enterprise |
DET0114
|
Detects use of dscl or id/group commands to enumerate local system groups, often by post-exploitation tools or persistence checks. |
| AN0320 | Windows |
Enterprise |
DET0115
|
Inbound spearphishing attempts delivered via third-party services (e.g., Gmail, LinkedIn messages) leading to malicious file downloads or browser-initiated script execution. Defender view includes correlation of external service logins, unexpected file write operations, and suspicious descendant processes spawned from productivity or browser applications. |
| AN0321 | Linux |
Enterprise |
DET0115
|
Use of non-enterprise email or messaging services in Thunderbird, Evolution, or browsers leading to suspicious file downloads and subsequent execution. Defender view includes browser-initiated downloads of unexpected content and shell or interpreter processes launched post-download. |
| AN0322 | macOS |
Enterprise |
DET0115
|
Phishing attempts via iCloud Mail, Gmail, or social media apps accessed on macOS systems. Defender view includes Mail.app or Safari downloads of files followed by osascript, Terminal, or abnormal child process execution. |
| AN0323 | Windows |
Enterprise |
DET0116
|
Abuse of safe mode via BCD modification, boot configuration utilities (bcdedit.exe, bootcfg.exe), and registry persistence under SafeBoot keys. Defender view: suspicious boot configuration changes correlated with registry edits that enable adversary persistence or disable defenses. |
| AN0324 | Windows |
Enterprise |
DET0117
|
Creation or modification of Windows services or scheduled tasks with names or descriptions mimicking legitimate entries, followed by anomalous execution of untrusted binaries or LOLBAS. |
| AN0325 | Linux |
Enterprise |
DET0117
|
Creation or modification of |
| AN0326 | macOS |
Enterprise |
DET0117
|
Creation of LaunchAgents or LaunchDaemons with names resembling known system services but executing non-Apple signed code or scripts. |
| AN0327 | Windows |
Enterprise |
DET0118
|
Correlates inbound network access to remote service ports (e.g., SMB/RPC 445/135, RDP 3389, WinRM 5985/5986) with near-time instability in the target service (crash, abnormal restart), suspicious child process creation under the service, and post-access lateral-movement behaviors. The chain indicates likely exploitation rather than normal administration. |
| AN0328 | Linux |
Enterprise |
DET0118
|
Links inbound network access to SSHD/SMB/NFS/Databases or custom daemons with subsequent daemon crash/restart, core dump, or spawning of shells/reverse shells from the service context, indicating remote exploitation. |
| AN0329 | ESXi |
Enterprise |
DET0118
|
Detects exploitation targeting ESXi/vCenter by correlating attempts to reach known exploitable endpoints (OpenSLP 427, CIM 5989, Hostd/Vpxa HTTPS 443, ESXi SOAP) with vmkernel/hostd crashes, unexpected hostd/vpxa restarts, or new reverse/outbound connections from ESXi host/vCenter to internal assets. |
| AN0330 | macOS |
Enterprise |
DET0118
|
Ties inbound access to exposed services (ARD/VNC 5900, SSH 22, ScreenSharing, web services) with process crashes in unified logs and abnormal child processes spawned under those services (e.g., bash, curl) to indicate exploitation. |
| AN0331 | Windows |
Enterprise |
DET0119
|
Detects execution of image viewers or PowerShell scripts accessing or decoding files with mismatched MIME headers or embedded script-like byte patterns; often correlated with suspicious parent-child process lineage and outbound connections. |
| AN0332 | Linux |
Enterprise |
DET0119
|
Detects access to media files followed by execution of scripts (bash, Python, etc.) referencing those same files, or outbound traffic triggered shortly after file read. Correlates unusual use of tools like |
| AN0333 | macOS |
Enterprise |
DET0119
|
Detects manipulation of PNG, JPG, or GIF files by user-initiated scripts followed by script execution or exfiltration behavior, especially from |
| AN0334 | Windows |
Enterprise |
DET0120
|
Correlated user account modification (reset, disable, deletion) events with anomalous process lineage (e.g., PowerShell or net.exe from an interactive session), especially outside of IT admin change windows or by non-admin users. |
| AN0335 | Linux |
Enterprise |
DET0120
|
Password changes or account deletions via 'passwd', 'userdel', or 'chage' preceded by interactive shell or remote command execution from non-privileged accounts. |
| AN0336 | macOS |
Enterprise |
DET0120
|
Execution of dscl or sysadminctl commands to disable, delete, or modify users combined with anomalous process ancestry or terminal session launch. |
| AN0337 | ESXi |
Enterprise |
DET0120
|
Invocation of esxcli 'system account remove' from vCLI, SSH, or vSphere API with anomalous user access or outside maintenance windows. |
| AN0338 | Office Suite |
Enterprise |
DET0120
|
O365 UnifiedAuditLog entries for Remove-Mailbox or Set-Mailbox with account disable or delete actions correlated with suspicious login locations or MFA bypass. |
| AN0339 | SaaS |
Enterprise |
DET0120
|
Deletion or disablement of user accounts in platforms like Okta, Salesforce, or Zoom with anomalies in admin session attributes or mass actions within short duration. |
| AN0340 | macOS |
Enterprise |
DET0121
|
Creation or modification of Login Items using AppleScript or Service Management Framework. Detection focuses on file creation/modification of |
| AN0341 | Windows |
Enterprise |
DET0122
|
Behavioral correlation of privileged registry key creation under the W32Time TimeProviders path combined with a new DLL written to disk and potential process activity by LocalService. Indicates abuse of Time Providers for persistence. |
| AN0342 | Windows |
Enterprise |
DET0123
|
Detects removable drive insertion followed by unusual file access, compression, or staging activity by unauthorized users or unexpected processes. |
| AN0343 | Linux |
Enterprise |
DET0123
|
Detects mounted external devices (via /media or /mnt) followed by large file read or copy operations by shell scripts, unauthorized users, or staging tools (e.g., tar, rsync). |
| AN0344 | macOS |
Enterprise |
DET0123
|
Detects mounting of external volumes followed by high-volume or sensitive file access via Finder, terminal, or third-party apps (e.g., rsync, zip). |
| AN0345 | Windows |
Enterprise |
DET0124
|
Process invokes a standard encoder (e.g., PowerShell -enc, certutil -encode, base64 via .NET/Invoke-Expression) or emits long Base64/hex literals → shortly followed by outbound network egress with high bytes_out:bytes_in ratio or HTTP headers/payloads containing Base64/MIME blocks. |
| AN0346 | Linux |
Enterprise |
DET0124
|
Shell/utility (base64, xxd -p, od, openssl enc -base64, python/perl base64 libraries) encodes data → subsequent outbound connections (curl/wget/bash TCP, socat, python requests) with high asymmetry or Base64/MIME blobs in HTTP/DNS payloads. |
| AN0347 | macOS |
Enterprise |
DET0124
|
Processes use base64/xxd/openssl/python Objective‑C APIs to encode data (seen in EndpointSecurity exec events or Unified Logs) → quick outbound connections with large bytes_out or HTTP POSTs carrying Base64/MIME bodies. |
| AN0348 | ESXi |
Enterprise |
DET0124
|
ESXi shell (BusyBox) or VMware utilities (openssl, python if present) used to Base64/hex encode data from datastore or config files → followed by abnormal egress from the host (NSX/flow logs) with asymmetric bytes_out or HTTPS posts to non-management endpoints. |
| AN0349 | macOS |
Enterprise |
DET0125
|
Unusual modification or creation of loginwindow-related plist files in '~/Library/Preferences/ByHost' correlated with unauthorized application paths and execution upon login. |
| AN0350 | Linux |
Enterprise |
DET0126
|
Adversary attempts to gain persistence by modifying ~/.ssh/authorized_keys via shell, text editor, echo or redirected output. |
| AN0351 | macOS |
Enterprise |
DET0126
|
Insertion of public keys into authorized_keys using bash/zsh or editor tools, correlated with suspicious process ancestry. |
| AN0352 | IaaS |
Enterprise |
DET0126
|
Abuse of cloud metadata APIs or CLI to push SSH public keys to authorized_keys of virtual machines. |
| AN0353 | ESXi |
Enterprise |
DET0126
|
Direct modification of /etc/ssh/keys- |
| AN0354 | Network Devices |
Enterprise |
DET0126
|
Use of command-line like |
| AN0355 | Windows |
Enterprise |
DET0127
|
Adversary renames LOLBINs or deploys binaries with spoofed file names, internal PE metadata, or misleading icons to appear legitimate. File creation is followed by execution or service registration inconsistent with known usage. |
| AN0356 | Linux |
Enterprise |
DET0127
|
Adversary drops renamed binaries in uncommon directories (e.g., /tmp, /dev/shm) or uses special characters in names (e.g., trailing space, Unicode RLO). Execution or cronjob registration follows shortly after file drop. |
| AN0357 | macOS |
Enterprise |
DET0127
|
Adversary creates disguised launch daemons or apps with misleading names and bundle metadata (e.g., Info.plist values inconsistent with binary path or icon). Launch is correlated with user logon or persistence setup. |
| AN0358 | Containers |
Enterprise |
DET0127
|
Adversary uses renamed container images, injects files into containers with misleading names or metadata (e.g., renamed system binaries), and executes them during startup or scheduled jobs. |
| AN0359 | ESXi |
Enterprise |
DET0127
|
Adversary places scripts or binaries with misleading names in /etc/rc.local.d or /var/spool/cron, or registers services with legitimate-sounding names not present in default ESXi builds. |
| AN0360 | Windows |
Enterprise |
DET0128
|
Suspicious use of scripting parameters or registry edits to hide process windows (e.g., powershell.exe -WindowStyle Hidden, or registry modifications pushing window positions off screen). Defender view: correlation of hidden execution with anomalous process lineage or hVNC-like CreateDesktop API calls. |
| AN0361 | Linux |
Enterprise |
DET0128
|
Suspicious invocation of GUI utilities or scripts with suppressed or redirected windowing options. Defender view: detection of X11 or Wayland calls to spawn windows that do not appear on active displays, or use of nohup/screen/tmux to mask interactive shells. |
| AN0362 | macOS |
Enterprise |
DET0128
|
Modification of plist files to set apple.awt.UIElement or similar flags hiding app icons and windows, and dscl/command-line activity that suppresses visibility. Defender view: correlation of plist modifications with unexpected hidden user applications. |
| AN0363 | Windows |
Enterprise |
DET0129
|
Adversary enumeration of domain accounts using net.exe, PowerShell, WMI, or LDAP queries from non-domain controllers or non-admin endpoints. |
| AN0364 | Linux |
Enterprise |
DET0129
|
Domain account enumeration using ldapsearch, samba tools (e.g., 'wbinfo -u'), or winbindd lookups. |
| AN0365 | macOS |
Enterprise |
DET0129
|
Domain group and user enumeration via dscl or dscacheutil, or queries to directory services from non-admin endpoints. |
| AN0366 | IaaS |
Enterprise |
DET0130
|
Detection of suspicious access to cloud-native secret management systems (AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, HashiCorp Vault). Focuses on abnormal secret retrieval activity, such as secrets being accessed by unusual identities, from unexpected regions, outside business hours, or at high volume. Correlates API calls to secret retrieval with surrounding authentication events, role assumptions, and anomalous execution patterns. |
| AN0367 | Windows |
Enterprise |
DET0131
|
Detects unusual outbound file transfer behavior using protocols like FTP, SMB, SMTP, or DNS, involving non-standard processes, off-hour activity, or uncommonly high volume. |
| AN0368 | Linux |
Enterprise |
DET0131
|
Detects file exfiltration using tools like curl, scp, or custom binaries over protocols such as FTP, HTTP/S, or DNS tunneling, especially outside baseline user behavior. |
| AN0369 | macOS |
Enterprise |
DET0131
|
Detects non-native file transfer via curl, Python scripts, or AppleScript using uncommon protocols like FTP, SMTP, or DNS exfiltration through mDNSResponder abuse. |
| AN0370 | IaaS |
Enterprise |
DET0131
|
Detects access to cloud APIs or CLI tools to move or sync files from sensitive buckets to external endpoints using protocols like HTTPS or S3 APIs. |
| AN0371 | ESXi |
Enterprise |
DET0131
|
Detects outbound traffic from hostd/vpxa or guest VM interfaces using unauthorized protocols such as FTP, HTTP POST bursts, or long-lived DNS tunnels. |
| AN0372 | Windows |
Enterprise |
DET0132
|
Adversary-created named mutex using system APIs (e.g., CreateMutexW) followed by conditional process termination or alternate code path indicating malware avoiding reinfection. |
| AN0373 | Linux |
Enterprise |
DET0132
|
File lock acquired via open() + flock() or lockf() on predictable path (e.g., /tmp/.lock123) followed by conditional early exit or divergent process behavior. |
| AN0374 | macOS |
Enterprise |
DET0132
|
User-mode application uses flock() or NSDistributedLock to gain exclusive access to a resource file (e.g., /tmp/guard.lock), conditional logic alters execution if already locked. |
| AN0375 | Windows |
Enterprise |
DET0133
|
Detection of the creation of VSCode or JetBrains CLI tunneling profiles followed by persistent remote access via IDE-integrated tunnels, potentially authenticated via GitHub or JetBrains accounts. |
| AN0376 | Linux |
Enterprise |
DET0133
|
Creation of VSCode tunnel configuration file combined with interactive remote session via code CLI or ssh with JetBrains gateway. |
| AN0377 | macOS |
Enterprise |
DET0133
|
Detection of JetBrains or VSCode tunnel profile creation followed by unusual persistent SSH or IDE-based tunnel communications to devtunnel APIs. |
| AN0378 | Windows |
Enterprise |
DET0134
|
Detects unauthorized access to Windows Credential Manager through anomalous process execution (vaultcmd.exe, rundll32.exe keymgr.dll), suspicious API calls (CredEnumerateA), or direct file access to Credential Locker files. Correlates process creation with subsequent file reads of .vcrd/.vpol files under user Credential Locker directories. |
| AN0379 | Windows |
Enterprise |
DET0135
|
Detects unauthorized use of SMTP/IMAP/POP3 by suspicious binaries (e.g., PowerShell, rundll32) to exfiltrate data or beacon via email, often bypassing proxy or content filters. |
| AN0380 | Linux |
Enterprise |
DET0135
|
Detects non-interactive or script-driven email transmission using tools like |
| AN0381 | macOS |
Enterprise |
DET0135
|
Detects email-sending behavior via Terminal, AppleScript, or Automator that interfaces with SMTP or IMAP, typically using curl or mail-related APIs in unsanctioned contexts. |
| AN0382 | Network Devices |
Enterprise |
DET0135
|
Detects hosts transmitting large volumes of SMTP, IMAP, or POP3 traffic to external IPs or relays that aren't associated with the enterprise mail infrastructure. |
| AN0383 | Windows |
Enterprise |
DET0136
|
Detection of unauthorized modification of Active Directory SID-History attributes to escalate privileges. This chain involves: (1) privileged operations or API calls to DsAddSidHistory or related AD modification functions, (2) observed attribute changes in SID-History (Event ID 5136), (3) new logon sessions where the token includes unexpected or privileged SID-History values, and (4) follow-on resource access using elevated privileges derived from SID-History injection. |
| AN0384 | Windows |
Enterprise |
DET0137
|
Unusual direct disk access attempts (e.g., use of \.\PhysicalDrive notation), abnormal writes to MBR/boot sectors, and installation of kernel drivers that grant raw disk access. Correlate anomalous process creation with disk modification attempts and driver loads. |
| AN0385 | Linux |
Enterprise |
DET0137
|
Processes invoking destructive commands (dd, shred, wipe) with raw device targets (e.g., /dev/sda, /dev/nvme0n1). Detect direct writes to disk partitions and abnormal superblock or bootloader modifications. Correlate shell execution with subsequent block device I/O. |
| AN0386 | macOS |
Enterprise |
DET0137
|
Abnormal invocation of diskutil, asr, or low-level APIs (IOKit) to erase/partition drives. Correlate process execution with unified log entries showing destructive disk operations. |
| AN0387 | Network Devices |
Enterprise |
DET0137
|
Execution of destructive CLI commands such as 'erase startup-config', 'erase flash:' or 'format disk' on routers/switches. Detect privilege level escalation preceding destructive commands. |
| AN0388 | Windows |
Enterprise |
DET0138
|
Execution of InstallUtil.exe from .NET framework directories with arguments specifying non-standard or attacker-supplied assemblies, especially when followed by suspicious child process creation or script execution. Detection also includes correlation of newly created binaries prior to InstallUtil invocation and anomalous command-line usage compared to historical baselines. |
| AN0389 | Windows |
Enterprise |
DET0139
|
Detects credential harvesting via userland API hooking (e.g., SetWindowsHookEx, IAT, or inline patching) by correlating memory modifications with hook installation functions and suspicious module loads in credential-sensitive processes like lsass.exe, explorer.exe, or winlogon.exe. |
| AN0390 | Linux |
Enterprise |
DET0139
|
Detects credential interception via malicious LD_PRELOAD-based shared libraries loaded into ssh, sudo, or scp processes. Correlates environment variable injection, unexpected library loads, and memory patching behavior. |
| AN0391 | macOS |
Enterprise |
DET0139
|
Detects DYLD_INSERT_LIBRARIES abuse to hook credential-sensitive applications by correlating process spawns with unauthorized library injection and monitoring changes to the __TEXT segment (code) of credential handling binaries. |
| AN0392 | Windows |
Enterprise |
DET0140
|
Detects adversary behavior deleting artifacts (e.g., dropped payloads, evidence files) using native or external utilities (e.g., del, erase, SDelete). Detects deletion events correlated with unusual process lineage or timing post-execution. |
| AN0393 | Linux |
Enterprise |
DET0140
|
Detects deletion of suspicious files (e.g., payloads, temp exes, scripts) via |
| AN0394 | macOS |
Enterprise |
DET0140
|
Detects removal of adversary artifacts via |
| AN0395 | ESXi |
Enterprise |
DET0140
|
Detects manual or scripted removal of logs, artifacts, or malware droppings via |
| AN0396 | Windows |
Enterprise |
DET0141
|
Process creation involving suspicious delays (e.g., Sleep, ping -n loops, WaitForSingleObject), followed by sensitive system access or lateral movement behaviors. |
| AN0397 | Linux |
Enterprise |
DET0141
|
Script-based execution of sleep loops or time delay commands (e.g., sleep, ping delay, while-loops) followed by file creation or network connections. |
| AN0398 | macOS |
Enterprise |
DET0141
|
Use of |
| AN0399 | Network Devices |
Enterprise |
DET0142
|
Detects unauthorized or anomalous use of command-line interfaces (CLI) on network devices. Focuses on remote access sessions (e.g., SSH/Telnet), privilege escalation within CLI sessions, execution of high-risk commands (e.g., config replace, terminal monitor, no logging), and configuration changes outside of approved windows. |
| AN0400 | Windows |
Enterprise |
DET0143
|
Processes that typically do not perform cryptographic operations loading symmetric encryption libraries (e.g., bcryptprimitives.dll, aes.dll), then initiating outbound connections with high-entropy payloads. Defender correlates process creation, DLL load, and anomalous encrypted traffic patterns. |
| AN0401 | Linux |
Enterprise |
DET0143
|
Unexpected processes (e.g., bash, python, custom binaries) dynamically loading libcrypto or performing AES/RC4 encryption operations, then initiating outbound sessions with abnormal byte entropy or asymmetric traffic patterns. |
| AN0402 | macOS |
Enterprise |
DET0143
|
Launchd jobs or user processes invoking symmetric crypto APIs from the Security framework and generating outbound connections carrying randomized payloads inconsistent with normal TLS patterns. |
| AN0403 | ESXi |
Enterprise |
DET0143
|
ESXi daemons (hostd, vpxa) unexpectedly using symmetric encryption routines for external connections. Defender identifies logs of service traffic with encrypted payloads inconsistent with VMware management baselines. |
| AN0404 | Network Devices |
Enterprise |
DET0143
|
Flows showing encrypted payloads with high entropy not matching TLS handshake patterns, particularly when occurring on non-standard ports. Defender observes NetFlow/IPFIX byte distribution anomalies or IDS/IPS detecting symmetric encryption patterns without associated key exchange. |
| AN0405 | Windows |
Enterprise |
DET0144
|
Detects forged Kerberos Golden Tickets by correlating anomalous Kerberos ticket lifetimes, unexpected encryption types (e.g., RC4 in modern domains), malformed fields in logon/logoff events, and TGS requests without preceding TGT requests. Also monitors for abnormal patterns of access associated with elevated privileges across multiple systems. |
| AN0406 | Windows |
Enterprise |
DET0145
|
Detection of firewall tampering by monitoring processes executing netsh, PowerShell Set-NetFirewallProfile, or sc stop mpssvc. Registry modifications under HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy also indicate adversarial actions. |
| AN0407 | Linux |
Enterprise |
DET0145
|
Detection of iptables, nftables, or firewalld rule modifications. Correlation of sudden drops in active firewall rules with suspicious processes suggests adversarial evasion. |
| AN0408 | macOS |
Enterprise |
DET0145
|
Detection of PF firewall rule modifications via pfctl, socketfilterfw, or defaults write to com.apple.alf. Adversaries often disable firewall profiles entirely or whitelist malicious processes. |
| AN0409 | ESXi |
Enterprise |
DET0145
|
Detection of firewall changes using esxcli network firewall set or vSphere API modifications. Sudden disabling of firewall rules across management interfaces is a strong adversarial signal. |
| AN0410 | Network Devices |
Enterprise |
DET0145
|
Detection of firewall ACL or rule base changes through CLI (e.g., no access-list, permit any any). Monitor configuration commits from unusual users or sessions. |
| AN0411 | Windows |
Enterprise |
DET0146
|
Adversary spawns command-line tools (e.g., del, cipher /w, SDelete) or scripts to recursively delete or overwrite user/system files. This may be correlated with abnormal file IO activity, registry writes, or tampering in critical system directories. |
| AN0412 | Linux |
Enterprise |
DET0146
|
Massive recursive deletions or overwrites via |
| AN0413 | macOS |
Enterprise |
DET0146
|
Destruction via |
| AN0414 | IaaS |
Enterprise |
DET0146
|
Adversary deletes critical infrastructure: EC2 instances, S3 buckets, snapshots, or volumes using elevated IAM credentials. Frequently includes batch API calls with |
| AN0415 | ESXi |
Enterprise |
DET0146
|
Adversary destroys virtual disks (VMDK), images, or VMs by invoking |
| AN0416 | Containers |
Enterprise |
DET0146
|
Container process executes destructive file operations inside volume mounts or host paths. Includes |
| AN0417 | SaaS |
Enterprise |
DET0147
|
Adversary gains access to cloud-hosted services such as AWS SES, SNS, or OpenAI API, enables or modifies usage policies, and initiates resource-intensive actions (e.g., mass email/SMS or LLM queries), often from unauthorized regions or under anomalous identity conditions. |
| AN0418 | Identity Provider |
Enterprise |
DET0148
|
Forged SAML tokens can be observed as authentication attempts with valid signatures but missing expected preceding Kerberos or authentication events. Defenders may correlate SAML assertions with absent Event IDs 4769, 1200, or 1202, or tokens issued with abnormal lifetimes, issuers, or claims compared to baseline. |
| AN0419 | IaaS |
Enterprise |
DET0148
|
Forged SAML tokens in IaaS environments often manifest as cross-cloud or cross-account authentication without matching STS events. Defenders may see AssumeRole or GetFederationToken API usage without a corresponding SAML assertion log from the trusted IdP. |
| AN0420 | Windows |
Enterprise |
DET0148
|
Forged SAML tokens may be used on Windows systems to authenticate to federated apps without normal Kerberos activity. Defenders may detect anomalous event correlation, where access to SaaS/O365 via SAML occurs without prior TGT requests or user logons. |
| AN0421 | SaaS |
Enterprise |
DET0148
|
Forged SAML tokens can appear as SaaS logins where authentication succeeded without MFA, or where tokens contain claims inconsistent with the user profile. Look for concurrent sessions across different geographies with the same SAML assertion ID. |
| AN0422 | Office Suite |
Enterprise |
DET0148
|
Forged SAML tokens may be leveraged to access O365 apps such as Outlook or SharePoint. Defenders should monitor for token replay across multiple clients or access attempts to privileged mailboxes without prior interactive login. |
| AN0423 | Windows |
Enterprise |
DET0149
|
Detects data access or staging events followed by outbound data flows using unencrypted protocols (e.g., FTP, HTTP) initiated by unexpected processes or to rare destinations. |
| AN0424 | Linux |
Enterprise |
DET0149
|
Detects file access or compression utilities followed by outbound connections using curl, wget, ftp, or custom binaries communicating over unencrypted protocols. |
| AN0425 | macOS |
Enterprise |
DET0149
|
Detects abnormal outbound HTTP/FTP connections by local scripts or binaries outside of standard browser activity, following access to local documents or user data. |
| AN0426 | ESXi |
Enterprise |
DET0149
|
Detects shell-based scripts accessing configuration files or snapshots and transmitting them over unencrypted protocols such as FTP or HTTP to non-management IPs. |
| AN0427 | Network Devices |
Enterprise |
DET0149
|
Detects use of unencrypted protocols (e.g., TFTP, FTP, HTTP) to transfer configuration files, routing tables, or logs to untrusted IP addresses, especially using administrative commands like |
| AN0428 | Windows |
Enterprise |
DET0150
|
Detection of raw access to physical drives, modification of boot records (MBR/VBR), and suspicious file creation or alteration within the EFI System Partition (ESP). Correlates privileged process execution with low-level disk modification and unexpected driver or firmware interactions. |
| AN0429 | Linux |
Enterprise |
DET0150
|
Detection of suspicious write operations to block devices, modifications of bootloader files (GRUB, initrd, vmlinuz), and unexpected changes within the EFI System Partition. Monitors privileged execution of utilities like dd, grub-install, or efibootmgr that modify boot sectors or loader entries. |
| AN0430 | Windows |
Enterprise |
DET0151
|
Untrusted or unusual process/script (cmd.exe, powershell.exe, w32tm.exe, net.exe, custom binaries) queries system time/timezone (e.g., w32tm /tz, net time \host, Get-TimeZone, GetTickCount API) and (optionally) is followed within a short window by time-based scheduling or conditional execution (e.g., schtasks /create, at.exe, PowerShell Start-Sleep with large values). |
| AN0431 | Linux |
Enterprise |
DET0151
|
A process (often spawned by a shell, interpreter, or malware implant) executes time discovery via commands (date, timedatectl, hwclock, cat /etc/timezone, /proc/uptime) or direct syscalls (time(), clock_gettime) and is (optionally) followed by scheduled task creation/modification (crontab, at) or conditional sleep logic. |
| AN0432 | macOS |
Enterprise |
DET0151
|
Process/script execution of systemsetup -gettimezone, date, ioreg, or API usage (timeIntervalSinceNow, gettimeofday) followed by time-based scheduling (launchd plist modification) or sleep-based execution. |
| AN0433 | ESXi |
Enterprise |
DET0151
|
Interactive or remote shell/API invocation of esxcli system clock get or querying time parameters via hostd/vpxa shortly followed by time/ntp configuration checks or scheduled task creation, executed by non-standard accounts or outside maintenance windows. |
| AN0434 | Network Devices |
Enterprise |
DET0151
|
Non-standard or rare users/locations issue CLI commands like "show clock detail" or "show timezone"; optionally followed by configuration of time/timezone or NTP sources. AAA/TACACS+ accounting and syslog correlate execution to identity, source IP, and privilege level. |
| AN0435 | macOS |
Enterprise |
DET0152
|
Detection focuses on adversaries placing or modifying malicious dylibs in locations searched by legitimate applications. From the defender’s perspective, observable patterns include unexpected creation or modification of dylib files in application bundle paths, unusual module loads by processes compared to historical baselines, and execution of applications loading dylibs from suspicious directories (e.g., /tmp, user-controlled paths). Correlation across file system changes, process execution, and module loads provides high-fidelity detection. |
| AN0436 | Windows |
Enterprise |
DET0153
|
Unusual processes (e.g., powershell.exe, wscript.exe, mshta.exe) posting data to webhook endpoints (Discord, Slack, webhook.site) using HTTP POST/PUT requests. Defender perspective: suspicious process lineage followed by outbound HTTPS traffic to webhook domains. |
| AN0437 | Linux |
Enterprise |
DET0153
|
Processes such as curl, wget, or custom scripts initiating POST requests to webhook endpoints with encoded or bulk data. Defender perspective: abnormal chaining of file compression or access followed by outbound data to webhook URLs. |
| AN0438 | macOS |
Enterprise |
DET0153
|
Unexpected apps or scripts (osascript, curl, Automator workflows) exfiltrating data via webhooks. Defender perspective: correlation of clipboard/file read operations followed by HTTPS POST traffic to webhook services. |
| AN0439 | ESXi |
Enterprise |
DET0153
|
VMware services or management daemons generating HTTP POST requests to webhook endpoints, chained with unusual datastore or log access. Defender perspective: exfiltration from VM logs or disk images over webhook URLs. |
| AN0440 | SaaS |
Enterprise |
DET0153
|
Suspicious SaaS tenant activity involving webhook configurations pointing to external or untrusted domains. Defender perspective: repeated automated exports or suspicious webhook endpoint registrations. |
| AN0441 | Windows |
Enterprise |
DET0154
|
Unusual screensaver (.scr) executions correlated with recent registry modifications to HKCU\Control Panel\Desktop values such as SCRNSAVE.exe, ScreenSaveTimeout, and ScreenSaveActive. Detection focuses on PE image paths not consistent with known legitimate screensavers and triggered after user inactivity timeout. |
| AN0442 | IaaS |
Enterprise |
DET0155
|
Monitor for unauthorized or unusual modifications to cloud resource hierarchies such as AWS Organizations or Azure Management Groups. Defenders may observe anomalous calls to APIs like |
| AN0443 | SaaS |
Enterprise |
DET0156
|
Automated and repetitive triggering of SMS messages through OTP/account verification fields on SaaS platforms, leveraging background messaging APIs such as Twilio, AWS SNS, or Amazon Cognito to generate traffic toward attacker-controlled numbers. |
| AN0444 | Windows |
Enterprise |
DET0157
|
Detects Kerberoasting attempts by monitoring for anomalous Kerberos TGS requests (Event ID 4769) with RC4 encryption (etype 0x17), accounts requesting an unusual number of service tickets in a short period, or service accounts targeted outside normal usage baselines. Also correlates suspicious process activity (e.g., Mimikatz invoking LSASS access) with Kerberos ticket anomalies. |
| AN0445 | Windows |
Enterprise |
DET0158
|
Detection of msiexec.exe execution where command-line arguments reference remote MSI packages, UNC paths, HTTP/HTTPS URLs, or DLLs, correlated with subsequent module loads and/or network connections to previously unseen destinations. The behavioral chain links process creation of msiexec.exe with suspicious parameters, network activity to retrieve payloads, and module loading indicative of malicious installation or DLL execution. |
| AN0446 | Windows |
Enterprise |
DET0159
|
Detection of USB-based remote access hardware (e.g., TinyPilot, PiKVM) attached to the host via drive or peripheral enumeration, triggering vendor identifiers or unusual EDID announcements. |
| AN0447 | Linux |
Enterprise |
DET0159
|
Insertion of USB-based hardware proxies (e.g., PiKVM) which register under predictable names (e.g., tinypilot) or mount under known paths (e.g., /opt/tinypilot-privileged). |
| AN0448 | macOS |
Enterprise |
DET0159
|
Attachment of hardware-backed USB KVM devices (e.g., TinyPilot) that enumerate new HID or serial communication interfaces with identifiable metadata. |
| AN0449 | Identity Provider |
Enterprise |
DET0160
|
Monitor for excessive or anomalous MFA push notifications or token requests, especially when login attempts originate from unusual IPs or geolocations and do not correspond to legitimate user-initiated sessions. |
| AN0450 | IaaS |
Enterprise |
DET0160
|
Detect abnormal MFA activity within cloud service provider logs, such as repeated generation of MFA challenges for the same user session or mismatched MFA device and login origin. |
| AN0451 | Windows |
Enterprise |
DET0160
|
Detect repeated failed login events followed by MFA challenges triggered in rapid succession, especially if originating from service accounts or anomalous IP addresses. |
| AN0452 | Linux |
Enterprise |
DET0160
|
Monitor PAM and syslog entries for unusual frequency of login attempts that trigger MFA prompts, particularly when MFA challenges do not match expected user behavior. |
| AN0453 | SaaS |
Enterprise |
DET0160
|
Detect anomalous OAuth or SSO logins that repeatedly generate MFA challenges, particularly where MFA approvals are denied or timed out by the user. |
| AN0454 | macOS |
Enterprise |
DET0160
|
Detect user account logon attempts that trigger multiple MFA challenges through enterprise identity integrations, especially if MFA push requests are generated without successful interactive login. |
| AN0455 | Windows |
Enterprise |
DET0161
|
Cause→effect chain: (1) a user or service spawns a shell/PowerShell that queries local/domain password policy via commands/cmdlets (e.g., |
| AN0456 | Linux |
Enterprise |
DET0161
|
Chain: (1) interactive/non-interactive |
| AN0457 | macOS |
Enterprise |
DET0161
|
Chain: (1) execution of |
| AN0458 | IaaS |
Enterprise |
DET0161
|
Chain: (1) cloud API calls that fetch tenant/organization password policy (e.g., AWS |
| AN0459 | Identity Provider |
Enterprise |
DET0161
|
Chain: (1) IdP policy/read operations by a principal (e.g., Microsoft Entra/Graph requests to read password or authentication policies); (2) adjacent risky changes (role assignment, app consent) by same principal. Use IdP audit logs. |
| AN0460 | SaaS |
Enterprise |
DET0161
|
Chain: (1) SaaS admin API or PowerShell remote session reads tenant password/authentication settings (e.g., M365 Unified Audit Log ‘Cmdlet’ with |
| AN0461 | Network Devices |
Enterprise |
DET0161
|
Chain: (1) privileged CLI sessions run read-only commands that dump AAA/password policies (e.g., |
| AN0462 | Windows |
Enterprise |
DET0162
|
Adversary installs/uses packet-capture or raw-socket capability (WinPcap/Npcap, wpcap/packet DLLs or raw socket attach) and sets a filter. A crafted inbound packet is observed; within a short window the host process that loaded capture libraries initiates an outbound connection (e.g., reverse shell) to the packet origin. |
| AN0463 | Linux |
Enterprise |
DET0162
|
Process creates a raw/packet socket and attaches a (e)BPF filter (setsockopt SO_ATTACH_FILTER/ATTACH_BPF or bpf(BPF_PROG_LOAD)). Immediately after a matching inbound packet, the same process binds/connects outward to a remote host (reverse shell or beacon). |
| AN0464 | macOS |
Enterprise |
DET0162
|
Process opens /dev/bpf* (libpcap) or loads NetworkExtension filter, then after a crafted inbound packet the same process initiates an outbound connection to the trigger origin. |
| AN0465 | Network Devices |
Enterprise |
DET0163
|
Defenders may observe unauthorized or anomalous changes to NAT configurations, including the addition of new translation rules or modifications to existing ones. Suspicious behaviors include sudden introduction of NAT mappings bridging segmented networks, new port address translation rules that obscure true source IPs, or traffic flows inconsistent with expected network design. Multi-event correlation includes detecting configuration changes on routers/firewalls, followed by traffic traversing unexpected internal/external address pairs. |
| AN0466 | Linux |
Enterprise |
DET0164
|
Detects adversary behavior where the command-line arguments of a running process are overwritten in memory to spoof the process name, typically replacing it with a benign or misleading string. The detection correlates unexpected null byte sequences, discrepancies between |
| AN0467 | Linux |
Enterprise |
DET0165
|
Detects adversary behavior clearing command history via |
| AN0468 | macOS |
Enterprise |
DET0165
|
Detects adversary clearing shell history using |
| AN0469 | Windows |
Enterprise |
DET0165
|
Detects PowerShell |
| AN0470 | ESXi |
Enterprise |
DET0165
|
Detects modification or truncation of |
| AN0471 | Network Devices |
Enterprise |
DET0165
|
Detects use of |
| AN0472 | Windows |
Enterprise |
DET0166
|
Adversary registers a malicious Microsoft Exchange transport agent DLL (.NET assembly), configures it via PowerShell or Exchange Management Shell, and persists code execution by manipulating email processing logic based on rules or headers. |
| AN0473 | Linux |
Enterprise |
DET0166
|
Adversary installs or modifies email content filters or transport scripts (e.g., Postfix milter, Sendmail milter, Exim filters) using shell access or configuration manipulation. |
| AN0474 | Windows |
Enterprise |
DET0167
|
Firmware flash utility invoked with elevated privileges followed by raw access to firmware device path or changes to boot configuration. |
| AN0475 | Linux |
Enterprise |
DET0167
|
Direct write access to /dev/mem or /sys/firmware combined with usage of firmware flashing utilities (e.g., flashrom). |
| AN0476 | macOS |
Enterprise |
DET0167
|
EFI updates executed via system processes or binaries outside of expected patch windows or using unsigned firmware packages. |
| AN0477 | Network Devices |
Enterprise |
DET0167
|
Firmware image uploaded via TFTP/SCP or web interface followed by reboot or unexpected loss of connectivity. |
| AN0478 | Windows |
Enterprise |
DET0168
|
Script or binary performs a rapid sequence of system discovery checks (e.g., CPU count, RAM size, registry keys, running processes) indicative of VM detection |
| AN0479 | Linux |
Enterprise |
DET0168
|
Shell script or binary uses multiple system commands (e.g., dmidecode, lscpu, lspci) in quick succession to detect virtualization environment |
| AN0480 | macOS |
Enterprise |
DET0168
|
Bash, Swift, or Objective-C programs enumerate system profile, I/O registry, or inspect kernel extensions to identify VM artifacts |
| AN0481 | IaaS |
Enterprise |
DET0169
|
Defenders should monitor for suspicious enumeration of cloud infrastructure components via APIs or CLI tools. Observable behaviors include repeated listing or description operations for compute instances, snapshots, storage buckets, and volumes. From a defender’s perspective, risky activity is often identified by new or untrusted identities making discovery calls (e.g., DescribeInstances, ListBuckets, az vm list, gcloud compute instances list), enumeration from unusual geolocations or IPs, or rapid multi-service discovery in sequence. Correlating discovery API usage with later snapshot creation or instance modification provides further context of adversary behavior. |
| AN0482 | Network Devices |
Enterprise |
DET0170
|
Defenders may observe adversary attempts to alter or replace a network device’s operating system image through anomalous CLI commands, unexpected firmware updates, integrity check failures, or mismatches in version and checksum validation. Suspicious behavior includes modification of image files on storage, OS version output inconsistent with baselines, unexpected reloads or reboots after image replacement, and changes to boot configuration that load non-standard system images. |
| AN0483 | IaaS |
Enterprise |
DET0171
|
Forged cookies in IaaS environments may appear as authentication attempts that bypass MFA, leveraging AssumeRole or session APIs with cookies that were never legitimately issued. Defenders should correlate cloud logs for cookie-based sessions without prior valid authentication, often followed by resource access from unfamiliar IP addresses. |
| AN0484 | Windows |
Enterprise |
DET0171
|
Forged web cookies on Windows endpoints can be detected by monitoring unusual modifications of browser cookie stores (e.g., Chrome SQLite DB, Edge cache) by processes outside of browsers, followed by authentication events to SaaS or IaaS services. Defenders may observe processes writing directly to cookie storage paths or injecting tokens into browser sessions. |
| AN0485 | Linux |
Enterprise |
DET0171
|
On Linux, defenders may observe forged cookie activity as unauthorized modifications to browser cookie databases (e.g., ~/.mozilla/firefox/*/cookies.sqlite, ~/.config/chromium/Default/Cookies) or scripted injection of session tokens. Suspicious usage includes curl/wget commands embedding forged cookies in headers, correlated with abnormal session activity in SaaS or IaaS logs. |
| AN0486 | macOS |
Enterprise |
DET0171
|
Forged cookies on macOS may show up as abnormal access to Safari/Chrome cookie databases in ~/Library/Cookies, combined with unexpected logon sessions authenticated by those cookies. Unified Logs may show cookie injection events or abnormal access patterns to Keychain when linked to browser authentication flows. |
| AN0487 | SaaS |
Enterprise |
DET0171
|
Forged cookies in SaaS environments manifest as valid web sessions without matching login activity, MFA enforcement bypass, or cookies reused across multiple devices/IPs. Defenders should look for cookie replay, concurrent sessions from multiple geographies, or session tokens generated by unrecognized apps. |
| AN0488 | Windows |
Enterprise |
DET0172
|
A trusted/signed developer utility (parent) is executed in a non-developer context and (a) spawns suspicious children (e.g., powershell.exe, cmd.exe, rundll32.exe, regsvr32.exe, wscript.exe), (b) loads unsigned/user-writable DLLs, (c) writes and then runs a new PE from user-writable paths, and/or (d) immediately makes outbound network connections. |
| AN0489 | Windows |
Enterprise |
DET0173
|
High-frequency, repetitive service requests (e.g., HTTP, TLS renegotiation) originating from a single or small set of source IPs targeting endpoint web services or application ports, leading to exhaustion of CPU or memory on targeted Windows services. |
| AN0490 | Linux |
Enterprise |
DET0173
|
Excessive inbound HTTP or TLS connections to services such as Apache or Nginx, causing worker thread exhaustion or segmentation faults. |
| AN0491 | macOS |
Enterprise |
DET0173
|
Flood of incoming TLS or HTTP(S) connections to macOS-hosted services (e.g., MAMP, Apache), causing high CPU usage and system unresponsiveness. |
| AN0492 | IaaS |
Enterprise |
DET0173
|
Automated or scripted HTTP/TLS flooding from one VM or cloud instance against another service, exploiting compute-based billing or exhaustion of service infrastructure. |
| AN0493 | Windows |
Enterprise |
DET0174
|
Detects adversary exploitation of authentication mechanisms or credential validation processes. Defender perspective includes forged Kerberos tickets (e.g., MS14-068), abnormal LSASS memory access, replayed authentication attempts, and unexpected crashes of authentication services. Multi-event correlation ties exploitation attempts to abnormal process creation, service instability, and suspicious authentication events. |
| AN0494 | Linux |
Enterprise |
DET0174
|
Detects exploitation of authentication daemons or PAM modules. Defender perspective includes failed or anomalous PAM authentications, abnormal segfaults in authentication services, and exploitation attempts followed by successful unauthorized logins. Correlation identifies memory corruption, replay attempts, and privilege escalation tied to credential services. |
| AN0495 | macOS |
Enterprise |
DET0174
|
Detects exploitation attempts against macOS authentication frameworks such as OpenDirectory or Keychain. Defender perspective includes abnormal crashes in opendirectoryd, unauthorized Keychain API usage, and unusual sudo or login events. Correlation links unexpected process behavior with credential access anomalies. |
| AN0496 | Identity Provider |
Enterprise |
DET0174
|
Detects exploitation of vulnerabilities in cloud identity providers (IdPs) such as Azure AD or Okta for credential access. Defender perspective includes anomalous token creation or renewal, authentication bypass events, and API abuse to mint unauthorized tokens. Correlation highlights exploitation attempts tied to absent or inconsistent audit logs. |
| AN0497 | Network Devices |
Enterprise |
DET0175
|
Detection of anomalous ROMMON image changes or upgrades, unexpected reboots following firmware updates, and unauthorized use of firmware upgrade commands or TFTP transfers. Correlation of config modification, privilege escalation, and boot cycle anomalies provides visibility into ROMMON tampering attempts. |
| AN0498 | Windows |
Enterprise |
DET0176
|
Correlated evidence of anomalous browser/network behavior (suspicious external resource fetches and script injection patterns) followed by atypical child processes, ephemeral execution contexts, memory modification or process injection, and unexpected file drops. Defender sees network requests to previously unseen/suspicious domains or resources + browser process spawning unusual children or loading unsigned modules + file writes or registry changes shortly after those requests. |
| AN0499 | Linux |
Enterprise |
DET0176
|
Correlated evidence of browser or webview fetches to uncommon domains or mutated JS resources (proxy/NGFW logs + Zeek/HTTP logs) followed by unexpected interpreters or script engines executing (python, ruby, sh) spawned from browser processes or user sessions, rapid on-disk staging in /tmp, and outbound connections that deviate from baseline. Defender sees: uncommon resource fetch → short-lived child process executions from user browser context → file writes in temp directories → anomalous outbound C2-like connections. |
| AN0500 | macOS |
Enterprise |
DET0176
|
Correlated evidence where Safari/Chrome/WebKit-based processes issue network requests for uncommon or obfuscated JS resources followed by spawning of script interpreters, launchd or ad-hoc binaries, unusual child processes, or dynamic library loads into browser processes. Defender sees: proxy/HTTP logs with suspicious resource content + unifiedlogs/ASL showing browser/plugin crashes or extension loads + process events indicating child process creation and file writes to /var/folders or /tmp shortly after the fetch. |
| AN0501 | Identity Provider |
Enterprise |
DET0176
|
Post-compromise identity & session anomalies that follow a drive-by compromise: token reuse from new/unfamiliar IPs, anomalous sign-in patterns for previously inactive users, unexpected consent/grant events, or provisioning changes. Defender sees an endpoint/browser compromise (network + endpoint signals) followed by unusual IdP events: new refresh token issuance, consent/consent-grant events, odd MFA bypass patterns, or unusual OAuth client registrations. |
| AN0502 | Windows |
Enterprise |
DET0177
|
Adversary uses a tool like Ruler to configure a malicious Outlook folder Home Page that loads a remote or embedded HTML payload upon folder interaction. Execution chain begins with Outlook launching, a specific folder being accessed, and a suspicious child process being spawned or COM-based execution invoked. |
| AN0503 | Office Suite |
Enterprise |
DET0177
|
Malicious HTML or script is rendered as a Home Page for a specific Outlook folder. Outlook accesses that folder, loads remote content, and executes embedded JavaScript or ActiveX/COM logic resulting in unauthorized actions or local execution. |
| AN0504 | Windows |
Enterprise |
DET0178
|
Detection of VNC service or executable starting unexpectedly, followed by user session creation and interactive desktop activity (mouse/keyboard simulation). |
| AN0505 | Linux |
Enterprise |
DET0178
|
Spawning of VNC-related processes (e.g., |
| AN0506 | macOS |
Enterprise |
DET0178
|
Detection of VNC-based remote control via |
| AN0507 | Windows |
Enterprise |
DET0179
|
Detection of adversary enumeration of domain or local group memberships via native tools such as net.exe, PowerShell, or WMI. This activity may precede lateral movement or privilege escalation. |
| AN0508 | Linux |
Enterprise |
DET0179
|
Detection of group enumeration using commands like 'id', 'groups', or 'getent group', often followed by privilege escalation or SSH lateral movement. |
| AN0509 | macOS |
Enterprise |
DET0179
|
Group membership checks via 'dscl', 'dscacheutil', or 'id', typically executed via terminal or automation scripts. |
| AN0510 | Windows |
Enterprise |
DET0180
|
Detection correlates file creation or modification of |
| AN0511 | Windows |
Enterprise |
DET0181
|
Creation or modification of stored procedures invoking xp_cmdshell or CLR assemblies for command execution and persistence. |
| AN0512 | Linux |
Enterprise |
DET0181
|
SQL stored procedures that invoke OS-level commands via |
| AN0513 | Windows |
Enterprise |
DET0182
|
Process or script enumerates network shares via CLI (net view/net share, PowerShell Get-SmbShare/WMI) or OS APIs (NetShareEnum/ srvsvc.NetShareEnumAll RPC) → bursts of outbound SMB/RPC connections (445/139, \host\IPC$ / srvsvc) to many hosts inside a short window → optional follow-on file listing or copy operations. |
| AN0514 | Linux |
Enterprise |
DET0182
|
CLI tools (smbclient -L, smbmap, rpcclient, nmblookup) or custom scripts enumerate SMB shares on many internal hosts → corresponding SMB connections (445/139) captured by Zeek/Netflow within a short window. |
| AN0515 | macOS |
Enterprise |
DET0182
|
Use of native/mac tools (sharing -l, smbutil view, mount_smbfs) or scripts to enumerate SMB shares across many hosts, followed by outbound SMB connections observed in PF/Zeek logs. |
| AN0516 | Windows |
Enterprise |
DET0183
|
Correlate suspicious file transfers over SMB or Admin$ shares with process creation events (e.g., cmd.exe, powershell.exe, certutil.exe) that do not align with normal administrative behavior. Detect remote file writes followed by execution of transferred binaries. |
| AN0517 | Linux |
Enterprise |
DET0183
|
Monitor scp, rsync, curl, sftp, or ftp processes initiating transfers to internal systems combined with file creation events in unusual directories. Correlate transfer activity with subsequent execution of those binaries. |
| AN0518 | macOS |
Enterprise |
DET0183
|
Detect anomalous use of scp, rsync, curl, or third-party sync apps transferring executables into user directories. Correlate new file creation with immediate execution events. |
| AN0519 | ESXi |
Enterprise |
DET0183
|
Identify lateral transfer via datastore file uploads or internal scp/ssh sessions that result in new VMX/VMDK or script files. Correlate transfer with VM execution or datastore modification. |
| AN0520 | Windows |
Enterprise |
DET0184
|
Monitors sequences involving deletion/modification of logs, registry keys, scheduled tasks, or prefetch files following suspicious process activity or elevated access escalation. |
| AN0521 | Linux |
Enterprise |
DET0184
|
Detects deletion or overwriting of bash history, syslog, audit logs, and .ssh metadata following privilege elevation or suspicious process spawning. |
| AN0522 | macOS |
Enterprise |
DET0184
|
Detects clearing of unified logs, deletion of plist files tied to persistence, and manipulation of Terminal history after initial execution. |
| AN0523 | Containers |
Enterprise |
DET0184
|
Monitors tampering with audit logs, volumes, or mounted storage often used for side-channel logging (e.g., /var/log inside containers) post-compromise. |
| AN0524 | ESXi |
Enterprise |
DET0184
|
Tracks suspicious use of ESXi shell commands or PowerCLI to delete logs, rotate system files, or tamper with hostd/vpxa history. |
| AN0525 | Office Suite |
Enterprise |
DET0184
|
Detects deletion or hiding of security-related mail rules, audit mailboxes, or calendar/log sync artifacts indicative of tampering post-intrusion. |
| AN0526 | IaaS |
Enterprise |
DET0185
|
Use of AWS STS or GCP IAM APIs to request temporary tokens or federation sessions inconsistent with normal account activity, including from unexpected principals or regions. |
| AN0527 | Identity Provider |
Enterprise |
DET0185
|
OAuth or SAML access tokens reused across multiple sessions or clients without corresponding MFA or login activity. |
| AN0528 | SaaS |
Enterprise |
DET0185
|
Application access tokens used to call APIs (e.g., Google Workspace, Salesforce) without interactive logins, often with unusual scopes or elevated permissions. |
| AN0529 | Office Suite |
Enterprise |
DET0185
|
OAuth token usage for Exchange Online or SharePoint API access without preceding login or from unauthorized clients. |
| AN0530 | Containers |
Enterprise |
DET0185
|
Compromised service account tokens mounted inside containers and reused for external API calls or lateral movement across services. |
| AN0531 | Windows |
Enterprise |
DET0186
|
Automated execution of native utilities and scripts to discover, enumerate, and exfiltrate files and clipboard content. Focus is on detecting repeated file access, scripting engine use, and use of command-line utilities commonly leveraged by collection scripts. |
| AN0532 | Linux |
Enterprise |
DET0186
|
Repeated or automated access to user document directories or clipboard using shell scripts or utilities like xclip/pbpaste. Detectable via auditd syscall logs or osquery file events. |
| AN0533 | macOS |
Enterprise |
DET0186
|
Use of pbpaste, AppleScript, or third-party automation frameworks (e.g., Automator) to collect clipboard or file content in bursts. Observable via unified logs. |
| AN0534 | SaaS |
Enterprise |
DET0186
|
Suspicious sign-ins to Graph API or sensitive resources using non-browser scripting agents (e.g., Python, PowerShell), often for programmatic access to mailbox or OneDrive content. |
| AN0535 | Windows |
Enterprise |
DET0187
|
Detection of attempts to disable or tamper with Windows Event Logging. This includes stopping or disabling the EventLog service, modifying registry keys related to EventLog and Autologger, using |
| AN0536 | Windows |
Enterprise |
DET0188
|
Drive enumeration using PowerShell ( |
| AN0537 | Linux |
Enterprise |
DET0188
|
Abnormal use of |
| AN0538 | macOS |
Enterprise |
DET0188
|
Disk enumeration via |
| AN0539 | ESXi |
Enterprise |
DET0188
|
Use of |
| AN0540 | Windows |
Enterprise |
DET0189
|
Detection of known tools or malware flagged by antivirus, followed by a near-term drop of a similar binary with modified signature and resumed activity (execution, C2, or persistence). |
| AN0541 | Linux |
Enterprise |
DET0189
|
Detection of anti-malware quarantining or flagging a tool, followed by a new binary written to disk with a similar function or name and a resumed process chain. |
| AN0542 | macOS |
Enterprise |
DET0189
|
Detection of XProtect or AV quarantining a known tool, followed by modification (file size, hash, string) and subsequent re-execution by the same or related user. |
| AN0543 | Windows |
Enterprise |
DET0190
|
Detects registry and Group Policy modifications that disable or weaken MFA, suspicious PowerShell usage modifying MFA-related attributes, and anomalous login sessions succeeding without expected MFA challenge. |
| AN0544 | Identity Provider |
Enterprise |
DET0190
|
Detects conditional access policy changes, exclusion of accounts from MFA enforcement, or registration of new MFA factors by non-admin or anomalous users. |
| AN0545 | IaaS |
Enterprise |
DET0190
|
Detects API calls to cloud secrets/MFA configurations where MFA enforcement policies are disabled or bypassed. |
| AN0546 | Linux |
Enterprise |
DET0190
|
Detects PAM module modifications or removal of MFA hooks in /etc/pam.d/ configurations, correlated with successful authentications lacking MFA prompts. |
| AN0547 | macOS |
Enterprise |
DET0190
|
Detects modifications to authorization plugins responsible for MFA enforcement and correlates with suspicious login sessions missing MFA prompts. |
| AN0548 | SaaS |
Enterprise |
DET0190
|
Detects suspicious MFA method changes, such as registration of weaker factors (e.g., SMS), or removal of MFA requirements for specific accounts or groups. |
| AN0549 | Office Suite |
Enterprise |
DET0190
|
Detects MFA bypass attempts by modifying tenant-wide authentication policies or excluding high-value accounts from MFA enforcement. |
| AN0550 | Windows |
Enterprise |
DET0191
|
Abuse of ClickOnce applications where rundll32.exe invokes dfshim.dll with ShOpenVerbApplication or dfsvc.exe spawns unexpected child processes or loads unsigned modules. |
| AN0551 | Windows |
Enterprise |
DET0192
|
Suspicious creation or modification of inbox rules through PowerShell (New-InboxRule, Set-InboxRule) to automatically delete, move, or hide emails. Defender perspective: unusual rule activity correlated with mailbox access and filtering patterns. |
| AN0552 | macOS |
Enterprise |
DET0192
|
Alterations to plist configuration files (RulesActiveState.plist, SyncedRules.plist, UnsyncedRules.plist, MessageRules.plist) that define email hiding or filtering rules. Defender perspective: unexpected changes in these files associated with Mail.app processes. |
| AN0553 | Linux |
Enterprise |
DET0192
|
Rule manipulation through local email clients (e.g., Evolution, Thunderbird) or server-side filtering scripts (e.g., sieve) creating conditions to move or discard emails with security-related keywords. |
| AN0554 | Office Suite |
Enterprise |
DET0192
|
Suspicious rule creation within Outlook or Exchange clients, including auto-move or delete conditions tied to incident or security alert keywords. Defender perspective: correlation between missing inbound emails and newly added mailbox rules. |
| AN0555 | Windows |
Enterprise |
DET0193
|
Identify unauthorized creation, deletion, or modification of business-critical stored data such as Office documents, database files, and log archives. Detect anomalous processes modifying stored data outside of expected workflows (e.g., non-database processes modifying database files). |
| AN0556 | Linux |
Enterprise |
DET0193
|
Detect suspicious file creation, modification, or deletion in stored data directories (e.g., |
| AN0557 | macOS |
Enterprise |
DET0193
|
Monitor sensitive data files such as plist-based storage, mail archives, or Office files for unexpected modifications. Detect anomalous processes modifying stored data outside expected update cycles using FSEvents and Unified Logs. |
| AN0558 | Windows |
Enterprise |
DET0194
|
Execution of control.exe or rundll32.exe with parameters pointing to CPL files, especially from non-standard directories or newly created files, followed by suspicious child process execution or registry modifications registering new Control Panel items. |
| AN0559 | Windows |
Enterprise |
DET0195
|
Execution of built-in tools (e.g., ipconfig, route, netsh) or PowerShell/WMI queries to enumerate IP, MAC, interface status, or routing configuration. |
| AN0560 | Linux |
Enterprise |
DET0195
|
Execution of |
| AN0561 | macOS |
Enterprise |
DET0195
|
Execution of |
| AN0562 | ESXi |
Enterprise |
DET0195
|
Use of |
| AN0563 | Network Devices |
Enterprise |
DET0195
|
CLI-based execution of interface and routing discovery commands (e.g., |
| AN0564 | Windows |
Enterprise |
DET0196
|
Suspicious outbound HTTPS connections where the TLS Server Name Indication (SNI) does not match the HTTP Host header, indicating potential use of domain fronting to mask C2 traffic via CDNs. |
| AN0565 | Linux |
Enterprise |
DET0196
|
Applications such as |
| AN0566 | macOS |
Enterprise |
DET0196
|
Unsigned or user-space apps initiate TLS connections with one hostname and HTTP headers requesting a different domain, commonly abused in CDN-resident domain fronting techniques. |
| AN0567 | ESXi |
Enterprise |
DET0196
|
Traffic originating from ESXi hosts or management interfaces displays SNI-to-Host mismatch behavior, particularly anomalous given typical infrastructure communication patterns. |
| AN0568 | Windows |
Enterprise |
DET0197
|
A non-standard process (or script-hosted process) loads camera/video-capture libraries (e.g., avicap32.dll, mf.dll, ksproxy.ax), opens the Camera Frame Server/device, writes video/image artifacts (e.g., .mp4/.avi/.yuv) to unusual locations, and optionally initiates outbound transfer shortly after. |
| AN0569 | Linux |
Enterprise |
DET0197
|
A process opens/reads /dev/video* (V4L2), performs ioctl/read loops, writes large/continuous video artifacts to disk, and/or quickly establishes outbound connections for exfiltration. |
| AN0570 | macOS |
Enterprise |
DET0197
|
A non-whitelisted process receives TCC camera entitlement (kTCCServiceCamera), opens AppleCamera/AVFoundation device handles, writes .mov/.mp4 artifacts to unusual locations, and/or beacons/exfiltrates soon after. |
| AN0571 | Containers |
Enterprise |
DET0198
|
Detection correlates anomalous Docker or Kubernetes API requests with access to logs, secrets, or service accounts. Observes unauthorized use of |
| AN0572 | ESXi |
Enterprise |
DET0199
|
Monitor for execution of hypervisor management commands such as |
| AN0573 | Linux |
Enterprise |
DET0199
|
Detects attempts to enumerate VMs via hypervisor tools like |
| AN0574 | Windows |
Enterprise |
DET0199
|
Detects enumeration of VMs using PowerShell ( |
| AN0575 | macOS |
Enterprise |
DET0199
|
Detects VM enumeration attempts using virtualization utilities such as VirtualBox ( |
| AN0576 | Windows |
Enterprise |
DET0200
|
Cause→effect chain: (1) A user or service launches an indirection utility (e.g., forfiles.exe, pcalua.exe, wsl.exe, scriptrunner.exe, ssh.exe with -o ProxyCommand/LocalCommand). (2) That utility spawns a secondary program/command (PowerShell, cmd, msiexec, regsvr32, curl, arbitrary EXE) and/or opens outbound network connections. (3) Optional precursor modification of SSH config to persist LocalCommand/ProxyCommand. Correlate process creation, command/script content, file access to %USERPROFILE%.ssh\config, and network connections from the utility or its child. |
| AN0577 | Windows |
Enterprise |
DET0201
|
DLL hijacking behaviors including unexpected DLL loads from non-standard directories, replacement of DLLs, phantom DLL insertion, redirection file creation, and substitution of legitimate DLLs. Defender correlates file system modifications, registry changes, and module load telemetry to detect abnormal DLL behavior in trusted processes. |
| AN0578 | Windows |
Enterprise |
DET0202
|
Detects interactive or scripted abuse of cmd.exe, batch files, or shell invocation chains. Focuses on parent-child relationships (e.g., cmd.exe launched from unusual parents), anomalous command-line parameters, and chaining with discovery, credential access, or lateral movement behaviors. |
| AN0579 | Linux |
Enterprise |
DET0203
|
Detects ptrace-based process injection by correlating audit logs of ptrace syscalls, memory modifications (e.g., poketext, pokedata), and suspicious register manipulation on a target process not normally debugged by the originator. Alerts on processes attempting to ptrace non-child or privileged processes, especially those followed by abnormal memory or execution behavior. |
| AN0580 | Windows |
Enterprise |
DET0204
|
Detects suspicious registry modifications under |
| AN0581 | Windows |
Enterprise |
DET0205
|
Execution of XSL scripts via msxsl.exe or wmic.exe using embedded JScript or VBScript for proxy execution. Detection correlates process creation, command-line patterns, and module load behavior of scripting components (e.g., jscript.dll). |
| AN0582 | Containers |
Enterprise |
DET0206
|
Detects abuse of container orchestration platforms (e.g., Kubernetes) where adversaries create CronJobs to maintain persistence or execute malicious Jobs across the cluster. |
| AN0583 | Windows |
Enterprise |
DET0207
|
Registry modification of the LSA Authentication Packages key followed by LSASS loading a non-standard or unsigned DLL. This includes unusual write access to |
| AN0584 | Windows |
Enterprise |
DET0208
|
Excessive resource exhaustion or service crash induced by processes launched by users or scripts that rapidly consume CPU/memory or attempt malformed service interactions. |
| AN0585 | Linux |
Enterprise |
DET0208
|
Malicious script or binary causes repeated kernel panics, OOM kills, or systemd service restarts targeting services like nginx, httpd, sshd. |
| AN0586 | macOS |
Enterprise |
DET0208
|
Adversary launches high-entropy process or malformed app bundle causing repeated application crashes and system slowdowns. |
| AN0587 | IaaS |
Enterprise |
DET0208
|
Instance enters degraded/unhealthy state due to abnormal process load or memory exhaustion, often caused by automation or script-based attacks. |
| AN0588 | Containers |
Enterprise |
DET0208
|
Container orchestrator logs show crashlooping pods, repeated resource exhaustion, or malicious binaries with infinite loops consuming systemd/cgroup limits. |
| AN0589 | Windows |
Enterprise |
DET0209
|
Registry read access associated with suspicious or non-interactive processes querying system config, installed software, or security settings. |
| AN0590 | Windows |
Enterprise |
DET0210
|
Detection of suspicious logon behavior using valid domain accounts across multiple hosts, off-hours, or simultaneous sessions from geographically distant locations. |
| AN0591 | Linux |
Enterprise |
DET0210
|
Use of domain accounts via sssd or winbind for logon activity outside of typical patterns, especially on sensitive systems or with lateral movement tools. |
| AN0592 | macOS |
Enterprise |
DET0210
|
Domain logins using network accounts or mobile accounts via Open Directory or Active Directory plugins, especially outside business hours or on atypical endpoints. |
| AN0593 | ESXi |
Enterprise |
DET0210
|
Login to vSphere or ESXi hosts using domain accounts, especially those associated with vpxuser or unexpected group memberships. |
| AN0594 | IaaS |
Enterprise |
DET0211
|
Direct login to cloud-hosted virtual machines via cloud-native access methods (e.g., EC2 Instance Connect, Azure Serial Console, SSM), followed by command execution or privilege escalation on the VM |
| AN0595 | Windows |
Enterprise |
DET0212
|
Adversary modifies or replaces the Terminal Services DLL ( |
| AN0596 | Windows |
Enterprise |
DET0213
|
Adversary uses a process to establish outbound connections that transmit uniform packet sizes at a consistent interval, avoiding threshold-based network alerts. |
| AN0597 | Linux |
Enterprise |
DET0213
|
Outbound connections from non-network-facing processes repeatedly send similarly sized payloads within uniform time intervals. |
| AN0598 | macOS |
Enterprise |
DET0213
|
Processes on macOS initiate external connections that consistently transmit data in fixed sizes using LaunchAgents or unexpected users. |
| AN0599 | Windows |
Enterprise |
DET0214
|
Detection of executables or scripts containing hidden embedded resources or secondary payloads, often with anomalies in file size vs. functionality or dropped child binaries. |
| AN0600 | Linux |
Enterprise |
DET0214
|
Detection of shell scripts, ELF binaries, or archives containing embedded secondary payloads, self-extracting components, or unusual compression behavior during runtime. |
| AN0601 | macOS |
Enterprise |
DET0214
|
Detection of Mach-O binaries or AppleScripts that contain nested, encoded, or run-only embedded payloads dropped at runtime. |
| AN0602 | Windows |
Enterprise |
DET0215
|
High-frequency file write operations using uncommon extensions, followed by ransom note creation, registry tampering, or shadow copy deletion. Often uses CLI tools like vssadmin, wbadmin, cipher, or PowerShell. |
| AN0603 | Linux |
Enterprise |
DET0215
|
Encryption via custom or open-source tools (e.g., openssl, gpg, aescrypt) recursively targeting user or system directories. Also includes overwrite of existing data and ransom note drops. |
| AN0604 | macOS |
Enterprise |
DET0215
|
Userland or kernel-level ransomware encrypting user files (Documents, Desktop) using |
| AN0605 | ESXi |
Enterprise |
DET0215
|
Ransomware encrypts .vmdk, .vmx, .log, or VM config files in VMFS datastores. May rename to .locked or delete/overwrite with encrypted versions. Often correlates with shell commands run through |
| AN0606 | IaaS |
Enterprise |
DET0215
|
Encryption of cloud storage objects (e.g., S3 buckets) via Server-Side Encryption (SSE-C) or by replacing objects with encrypted variants. May include API patterns like PutObject with SSE-C headers. |
| AN0607 | macOS |
Enterprise |
DET0216
|
Detection focuses on unauthorized modification of Mach-O binaries to include LC_LOAD_DYLIB headers pointing to malicious dylibs. Behavior is identified via a chain of file metadata changes, removal of code signatures, and subsequent anomalous dylib loads at runtime. Correlation of file changes with lack of authorized updates and process memory mapping of unrecognized or unsigned libraries is crucial. |
| AN0608 | Windows |
Enterprise |
DET0217
|
Detects adversary manipulation of Extra Window Memory (EWM) in a GUI process, where the attacker uses SetWindowLong or SetClassLong to redirect function pointers to injected shellcode stored in shared memory, then triggers execution via a window message like SendNotifyMessage. |
| AN0609 | Windows |
Enterprise |
DET0218
|
Unusual modifications to service binary paths, registry keys, or DLL load paths resulting in alternate execution flow. Defender observes registry key modifications, suspicious file writes into system directories, and processes loading libraries from abnormal paths. |
| AN0610 | Linux |
Enterprise |
DET0218
|
Adversary manipulation of shared library paths, environment variables, or replacement of service binaries. Defender observes suspicious modifications in /etc/ld.so.preload, service config changes, or file writes replacing existing executables. |
| AN0611 | macOS |
Enterprise |
DET0218
|
Abuse of DYLD_INSERT_LIBRARIES or hijacking framework paths for malicious libraries. Defender observes processes invoking abnormal dylibs, modified plist files, or persistence entries pointing to altered binaries. |
| AN0612 | Containers |
Enterprise |
DET0219
|
Detection of container escape attempts via bind mounts, privileged containers, or abuse of docker.sock. Defenders may observe anomalous volume mount configurations (e.g., hostPath to / or /proc), unexpected privileged container launches, or use of container administration commands to access host resources. These events typically correlate with subsequent process execution on the host outside of normal container isolation. |
| AN0613 | Linux |
Enterprise |
DET0219
|
Detection of Linux container escape attempts via syscalls ( |
| AN0614 | Windows |
Enterprise |
DET0219
|
Detection of Windows container escape attempts by observing processes accessing host directories, symbolic link abuse, or privilege escalation attempts. Defenders may detect anomalous process execution with access to system-level directories outside of container boundaries. |
| AN0615 | ESXi |
Enterprise |
DET0219
|
Detection of ESXi escape attempts by monitoring for anomalies in hypervisor logs such as unexpected VM operations, privilege escalation events, or attempts to load malicious kernel modules within the hypervisor environment. |
| AN0616 | Windows |
Enterprise |
DET0220
|
Detects USB device insertion followed by high-volume or sensitive file access and staging activity by suspicious processes or accounts. |
| AN0617 | Linux |
Enterprise |
DET0220
|
Detects USB block device mount followed by file access in sensitive directories or high-volume copy operations by user-controlled processes. |
| AN0618 | macOS |
Enterprise |
DET0220
|
Detects external volume mount with Finder, Terminal, or script-initiated file copy from user profiles, sensitive folders, or cloud storage sync directories to USB. |
| AN0619 | Windows |
Enterprise |
DET0221
|
Unusual or unauthorized processes accessing microphone APIs (e.g., winmm.dll, avrt.dll) followed by audio file writes to user-accessible or temp directories. |
| AN0620 | Linux |
Enterprise |
DET0221
|
Processes accessing ALSA/PulseAudio devices or executing audio capture binaries like 'arecord', followed by file creation or suspicious child process spawning. |
| AN0621 | macOS |
Enterprise |
DET0221
|
Processes invoking AVFoundation or CoreAudio frameworks, accessing input devices via TCC logs or Unified Logs, followed by writing AIFF/WAV/MP3 files to disk. |
| AN0622 | Windows |
Enterprise |
DET0222
|
Abuse of mmc.exe to execute non-Microsoft or user-staged .msc files and malicious COM CLSIDs. Behavioral chain: (1) suspicious mmc.exe invocation with /a or -Embedding and non-standard .msc path → (2) COM activation of non-baseline CLSIDs by mmc.exe → (3) mmc.exe loads non-baseline DLLs (user-writable/UNC/unsigned) → (4) optional network/DNS activity from mmc.exe. |
| AN0623 | Windows |
Enterprise |
DET0223
|
Detects SCCM, Intune, or remote push execution spawning scripts or binaries from SYSTEM context or unusual consoles (e.g., cmtrace.exe launching PowerShell or cmd.exe). |
| AN0624 | Linux |
Enterprise |
DET0223
|
Detects remote scripts or binaries deployed via Puppet, Chef, Ansible, or shell scripts from orchestration servers executing outside maintenance windows or in unmanaged nodes. |
| AN0625 | macOS |
Enterprise |
DET0223
|
Detects script or binary execution initiated via JAMF, Munki, or custom MDM agents outside of baseline, or JAMF launching new Terminal or osascript processes from remote command payloads. |
| AN0626 | SaaS |
Enterprise |
DET0223
|
Detects cloud-native software deployment or management (e.g., SSM Run Command, Intune) initiating script execution on endpoints outside expected org IDs, admin groups, or maintenance windows. |
| AN0627 | Network Devices |
Enterprise |
DET0223
|
Detects central router or switch config management tools (e.g., FortiManager, Cisco Prime) triggering device reboots or config pushes using abnormal accounts or IPs. |
| AN0628 | Windows |
Enterprise |
DET0224
|
Detects anomalous use of COM objects for execution, such as Office applications spawning scripting engines, enumeration of COM interfaces via registry queries, or processes loading atypical DLLs through COM activation. Correlates process creation, module loads, and registry queries to flag suspicious COM-based code execution or persistence. |
| AN0629 | Windows |
Enterprise |
DET0225
|
Unauthorized creation or modification of DLLs loaded by LSASS, abnormal registry values under LSA extensions, and anomalous DLL load activity into the lsass.exe process context—correlated during boot or logon events. |
| AN0630 | Windows |
Enterprise |
DET0226
|
Detects behavior where files with non-executable or misleading extensions (e.g., .jpg, .txt) are created or modified but subsequently executed as binaries based on internal file headers or abnormal parent process lineage. This includes identifying polyglot files or malformed magic bytes indicative of masquerading attempts. |
| AN0631 | Linux |
Enterprise |
DET0226
|
Detects when a script or binary is named with misleading or benign-looking extensions (.jpg, .doc) and is then executed via command line or a scheduled task. Includes ELF header mismatches and content-type inconsistencies on disk. |
| AN0632 | macOS |
Enterprise |
DET0226
|
Detects binaries disguised as media or document types through extension-only masquerading or by modifying the file signature. Observes execution of files whose extension is not typically executable (.jpg, .txt), yet have valid Mach-O headers or execute via Terminal or launch services. |
| AN0633 | Windows |
Enterprise |
DET0227
|
Processes initiating outbound connections on uncommon ports or using protocols inconsistent with the assigned port. Correlating process creation with subsequent network connections reveals anomalies such as svchost.exe or Office applications using high, atypical ports. |
| AN0634 | Linux |
Enterprise |
DET0227
|
Unusual daemons or user processes binding/listening on ports outside of standard ranges, or initiating client connections using mismatched protocol/port pairings. |
| AN0635 | macOS |
Enterprise |
DET0227
|
Applications making outbound connections on non-standard ports or launchd services bound to ports inconsistent with system baselines. |
| AN0636 | ESXi |
Enterprise |
DET0227
|
VM services or management daemons communicating on ports not defined by VMware defaults, such as vpxa or hostd processes initiating traffic over high-numbered or unexpected ports. |
| AN0637 | Windows |
Enterprise |
DET0228
|
Initial process initiates outbound connection to first-stage C2, receives payloads or commands, then spawns or injects into a second process that establishes a new outbound connection to an unrelated destination (second-stage C2). |
| AN0638 | Linux |
Enterprise |
DET0228
|
Shell script or binary initiates curl/wget request to staging domain, writes output to disk or memory, and shortly afterward launches another process that establishes new outbound connection to a different IP or hostname. |
| AN0639 | macOS |
Enterprise |
DET0228
|
Initial process using NSURLSession or similar APIs reaches out to known staging domains, followed by creation of a reverse shell or RAT connecting to a second unrelated server. |
| AN0640 | ESXi |
Enterprise |
DET0228
|
CLI-based or API-based network call from the hypervisor to external staging host, shortly followed by a connection to a second external IP by a spawned process or scheduled task. |
| AN0641 | Windows |
Enterprise |
DET0229
|
Enumeration of global address lists or email account metadata via PowerShell cmdlets (e.g., Get-GlobalAddressList) or MAPI/RPC from non-admin, non-mailserver systems. |
| AN0642 | Office Suite |
Enterprise |
DET0229
|
Suspicious querying of organization-wide directory data via Google Workspace Directory API or Outlook GAL sync in high volume from abnormal users, service accounts, or unknown device contexts. |
| AN0643 | Windows |
Enterprise |
DET0230
|
Detects execution of binaries signed with unusual or recently issued certificates, correlation of process execution with abnormal publisher metadata, and mismatched certificate chains. Monitors for revoked or unknown code signing certificates used in high-privilege contexts. |
| AN0644 | macOS |
Enterprise |
DET0230
|
Monitors Gatekeeper, spctl, and unified log entries for binaries executed with unexpected or untrusted signatures. Correlates file metadata changes with process launches where signature validation is skipped, altered, or fails but the process still executes. |
| AN0645 | Linux |
Enterprise |
DET0231
|
Detects adversarial abuse of systemd timers by correlating file creation/modification of .timer and .service units in system directories with the execution of abnormal child processes launched by 'systemd' (PID 1), especially as root. |
| AN0646 | ESXi |
Enterprise |
DET0232
|
Detects anomalous usage of ESXi Guest Operations APIs such as StartProgramInGuest, ListProcessesInGuest, ListFileInGuest, or InitiateFileTransferFromGuest. Defender perspective focuses on unusual frequency of guest API calls, invocation from unexpected management accounts, or execution outside of business hours. These correlated signals indicate adversarial abuse of ESXi administrative services to run commands on guest VMs. |
| AN0647 | Network Devices |
Enterprise |
DET0233
|
Defenders may observe adversary attempts to collect or export full device configurations by detecting unusual SNMP queries, Smart Install (SMI) activity, or CLI/API commands that request running or startup configuration dumps. Correlated behaviors include high-volume read requests for sensitive OIDs, repeated use of 'show running-config' or equivalent commands from untrusted IPs, or unexpected TFTP/SCP/FTP transfers containing configuration files. These behaviors often appear in sequence: anomalous authentication or privilege escalation, followed by bulk configuration retrieval and outbound transfer. |
| AN0648 | Windows |
Enterprise |
DET0234
|
Processes accessing LSASS memory or SAM registry hives outside of trusted security tools, often followed by file creation or lateral movement. Detects unauthorized access to sensitive OS subsystems for credential extraction. |
| AN0649 | Linux |
Enterprise |
DET0234
|
Processes opening /proc//mem or /proc//maps targeting credential-storing services like sshd or login. Behavior often includes high privilege escalation and memory inspection tools such as gcore or gdb. |
| AN0650 | macOS |
Enterprise |
DET0234
|
Unsigned processes accessing system memory or launching known credential scraping tools (e.g., osascript, dylib injections) to access the Keychain or sensitive memory regions. |
| AN0651 | Windows |
Enterprise |
DET0235
|
Detect the creation or modification of common media file formats (e.g., .jpg, .png, .wav) following suspicious process activity like compression or encryption, especially when paired with lateral movement or exfiltration behavior. |
| AN0652 | Linux |
Enterprise |
DET0235
|
Unusual use of steganographic or media processing binaries (e.g., |
| AN0653 | macOS |
Enterprise |
DET0235
|
Abnormal usage of Preview, ImageMagick, or binary editors to alter images/documents, followed by exfiltration or outbound connections with mismatched file MIME types or payload structure. |
| AN0654 | ESXi |
Enterprise |
DET0235
|
Suspicious modification of file artifacts (e.g., logs, ISO templates) on ESXi datastores, followed by beaconing or POST operations to external IPs potentially hiding payloads in file-like traffic. |
| AN0655 | Windows |
Enterprise |
DET0236
|
Detection of spearphishing attachments by correlating suspicious email delivery with subsequent file creation and abnormal process execution (e.g., Office spawning PowerShell or CMD). Behavior chain includes inbound email metadata → attachment stored on disk → process execution → outbound network activity. |
| AN0656 | Linux |
Enterprise |
DET0236
|
Phishing attachments executed on Linux systems are detected by linking email logs to file creation in mail directories and subsequent suspicious process execution. Look for unexpected binaries or scripts spawned from user mail directories and anomalous outbound network activity. |
| AN0657 | macOS |
Enterprise |
DET0236
|
Phishing attachment detection on macOS through correlation of Mail app logs, file creation in user directories, and abnormal process execution (e.g., Preview.app or Mail.app spawning Terminal or scripting binaries). Network traffic after attachment interaction is also monitored. |
| AN0658 | Linux |
Enterprise |
DET0237
|
Detection of modified or newly created /etc/rc.local or /etc/init.d scripts followed by suspicious execution during system startup. |
| AN0659 | macOS |
Enterprise |
DET0237
|
Detection of edits or additions to /etc/rc.common, /Library/StartupItems, or /System/Library/StartupItems and associated script execution during login or reboot. |
| AN0660 | ESXi |
Enterprise |
DET0237
|
Detection of changes to /etc/rc.local.d/local.sh or rc.local during post-boot script execution with abnormal commands or additions. |
| AN0661 | Network Devices |
Enterprise |
DET0237
|
Detection of modified boot-time configuration scripts that persist malicious CLI commands across reboots. |
| AN0662 | Windows |
Enterprise |
DET0238
|
Adversary modifies website or application-hosted content via unauthorized file changes or script injections, often by exploiting web servers or CMS access. |
| AN0663 | Linux |
Enterprise |
DET0238
|
Adversary gains shell access or uploads a malicious script to deface hosted web content in Nginx, Apache, or other services. |
| AN0664 | macOS |
Enterprise |
DET0238
|
Adversary modifies internal or external site content through manipulated application bundles, hosted content, or web server configs. |
| AN0665 | ESXi |
Enterprise |
DET0238
|
Adversary defaces internal VM-hosted portals or web UIs by modifying static content on datastore-mounted paths. |
| AN0666 | IaaS |
Enterprise |
DET0238
|
Adversary uses compromised instance credentials or web application access to deface content hosted in S3 buckets, Azure Blob Storage, or GCP Buckets. |
| AN0667 | Windows |
Enterprise |
DET0239
|
Correlates registry modifications to EventLog or WMI Autologger keys, suspicious use of Set-EtwTraceProvider, and Sysmon configuration changes. Defender sees interruption or redirection of ETW and log event collection. |
| AN0668 | Linux |
Enterprise |
DET0239
|
Detects disabling or reconfiguration of syslog or rsyslog services. Monitors sudden stops in logging daemons and suspicious execution of kill or service stop commands targeting syslog processes. |
| AN0669 | macOS |
Enterprise |
DET0239
|
Detection of tampering with Apple's Unified Logging framework or modification of system log forwarding settings. Defender observes execution of logd-related commands or defaults write to logging preferences. |
| AN0670 | ESXi |
Enterprise |
DET0239
|
Detection of syslog configuration tampering using esxcli system syslog config set or reload. Defender correlates command execution with absence of syslog forwarding activity. |
| AN0671 | Windows |
Enterprise |
DET0240
|
Monitor for abnormal certificate enrollment and usage activity in Active Directory Certificate Services (AD CS), registry access to certificate storage locations, and unusual process executions that attempt to export or access private keys. |
| AN0672 | Linux |
Enterprise |
DET0240
|
Monitor for file access to certificate directories, commands invoking OpenSSL or PKCS#12 utilities to export or modify certificates, and processes accessing sensitive key storage paths. |
| AN0673 | macOS |
Enterprise |
DET0240
|
Monitor for security commands and API calls interacting with the Keychain, as well as file access attempts to stored certificates and private keys in ~/Library/Keychains or /Library/Keychains. |
| AN0674 | Identity Provider |
Enterprise |
DET0240
|
Monitor for abnormal certificate enrollment events in identity platforms, unexpected use of token-signing certificates, and unusual CA configuration modifications. |
| AN0675 | Windows |
Enterprise |
DET0241
|
Detects forged Kerberos Silver Tickets by identifying anomalous Kerberos service ticket activity such as malformed fields in logon events, TGS requests without interaction with the KDC, and access attempts using service accounts outside expected hosts/resources. Also monitors suspicious processes accessing LSASS memory for credential dumping. |
| AN0676 | Linux |
Enterprise |
DET0242
|
Unusual database command-line access (e.g., |
| AN0677 | Windows |
Enterprise |
DET0242
|
Database client execution (e.g., sqlcmd.exe, isql.exe) by users or from locations not tied to enterprise automation or backups. Often followed by creation of .sql/.bak/.csv files, registry artifacts for ODBC/JDBC drivers, or encrypted ZIPs. Defender sees SQL tools launched by explorer.exe, Powershell, or odd parent processes, plus file writes in user temp locations. |
| AN0678 | macOS |
Enterprise |
DET0242
|
Execution of Java-based or CLI database tools (e.g., DBeaver, Beekeeper, mysql, psql) from user profiles not tied to dev/admin roles, especially when followed by file writes and cloud sync activity. Defender correlates GUI tool launches, file write events in ~/Downloads or ~/Documents, and outbound API calls to known cloud services. |
| AN0679 | IaaS |
Enterprise |
DET0242
|
Database enumeration and export activity (e.g., |
| AN0680 | SaaS |
Enterprise |
DET0242
|
Unusual or excessive database/table exports from SaaS database platforms (e.g., Snowflake, Firebase, BigQuery, Airtable) by users or apps not in known analytics or dev groups. Defender observes access patterns outside baseline working hours or with new query templates, and correlates those with audit logs or file downloads. |
| AN0681 | Network Devices |
Enterprise |
DET0243
|
Defenders may observe attempts to alter cryptographic settings on network devices that reduce key strength or allowable cipher suites. Suspicious indicators include configuration changes that downgrade encryption algorithms, key length parameters, or the disabling of strong encryption in favor of legacy ciphers. These activities often appear as CLI commands modifying crypto policies, firmware changes affecting crypto libraries, or unexpected updates to key management files. Correlation across device config logs and traffic analysis showing weaker ciphers provides higher confidence of malicious key space reduction. |
| AN0682 | macOS |
Enterprise |
DET0244
|
Detection of persistent login hooks configured via defaults or plist modifications that result in execution of scripts or binaries at user login, breaking expected parent-child process lineage. |
| AN0683 | Windows |
Enterprise |
DET0245
|
Monitor call log records from corporate devices for unusual or unauthorized numbers, especially repeated calls to/from known malicious phone numbers. Correlate with subsequent system events (e.g., browser navigation, remote management tool execution). |
| AN0684 | Linux |
Enterprise |
DET0245
|
Audit VoIP/SIP logs for suspicious outbound calls or call setup messages to unusual endpoints. Correlate with user activity such as browser execution or package installation following the call. |
| AN0685 | macOS |
Enterprise |
DET0245
|
Monitor Facetime, iMessage, or SIP client logs for anomalous voice call attempts. Link to subsequent user execution events (downloads, RMM installs) triggered post-call. |
| AN0686 | Identity Provider |
Enterprise |
DET0245
|
Correlate MFA push fatigue or unusual consent grant attempts with call activity where adversaries may have socially engineered the user over voice. |
| AN0687 | Windows |
Enterprise |
DET0246
|
Behavior chain involving unexpected API calls to capture keyboard input, driver loads for keyloggers, or remote use of smart card authentication via logon sessions not initiated by local user interaction |
| AN0688 | Linux |
Enterprise |
DET0246
|
Detection of unauthorized keylogger behavior through access to |
| AN0689 | macOS |
Enterprise |
DET0246
|
Processes accessing TCC-protected input APIs or polling HID services without user interaction, or dynamically loaded keylogging frameworks using accessibility privileges |
| AN0690 | IaaS |
Enterprise |
DET0247
|
Detects creation of cloud instances, services, or resources in normally unused or unsupported regions, especially following initial account access or credential use from known regions. Correlates resource provisioning across regions with absence of historical usage and alerting from standard logging services (e.g., GuardDuty not enabled in that region). |
| AN0691 | Linux |
Enterprise |
DET0248
|
CONTAINERS (Docker/K8s/containerd): A user pulls an untrusted image from a public/unknown registry and then creates/starts a container from that image. Shortly after start, the container spawns unexpected utilities (e.g., curl/wget/bash/python), or makes outbound network connections atypical for the namespace/workload. The analytic correlates Image Creation/Download → Container Creation → Container Start → Command Execution/Network activity within a short window and with a consistent image digest. |
| AN0692 | Windows |
Enterprise |
DET0248
|
IAAS (Cloud images/VMs): A new VM/instance is launched from a non-approved or newly-seen image (AMI/GCP Image/Azure Image). On first boot, cloud-init/user-data or embedded agents download code, spawn system utilities, or open outbound C2/mining traffic. The analytic correlates Instance/Image Creation → Instance Start → in-guest Process/Command Execution and/or anomalous network traffic. |
| AN0693 | Containers |
Enterprise |
DET0249
|
Remote/API driven creation and start of a container whose image is not on an allow‑list (or is tagged |
| AN0694 | Windows |
Enterprise |
DET0250
|
Defenders observe command-line executions or API-based registry reads targeting sensitive paths like HKLM or HKCU with keyword filters such as 'password', 'cred', or 'logon'. Typically performed by Reg.exe, PowerShell, custom binaries, or offensive tools such as Cobalt Strike. Correlation with process ancestry and command-line arguments indicates suspicious credential discovery activity. |
| AN0695 | IaaS |
Enterprise |
DET0251
|
Detects adversarial use of cloud-native APIs (e.g., AWS IAM, Azure RBAC, GCP Identity) to enumerate cloud group memberships or policy mappings via unauthorized sessions or scripts. |
| AN0696 | Office Suite |
Enterprise |
DET0251
|
Identifies unauthorized access or enumeration of administrative roles, security groups, or distribution groups via Exchange/SharePoint/Teams APIs or role discovery scripts. |
| AN0697 | SaaS |
Enterprise |
DET0251
|
Monitors API calls and service-specific logs for enumeration of organizational roles, permissions, and group structure, particularly outside of normal admin behavior baselines. |
| AN0698 | Linux |
Enterprise |
DET0252
|
User-initiated installation of Python (pip), NodeJS (npm), or other language libraries, followed by unexpected network connections, credential access, or startup file modifications. Defender sees |
| AN0699 | Windows |
Enterprise |
DET0252
|
Execution of |
| AN0700 | macOS |
Enterprise |
DET0252
|
Execution of Homebrew, pip3, npm, or manually downloaded PKGs from Terminal or shell, followed by the creation of startup agents, interpreter spawns, or outbound connections to unfamiliar domains. Defender links Terminal commands to plist creation, unsigned binary launches, and |
| AN0701 | Linux |
Enterprise |
DET0253
|
Detects the creation or modification of |
| AN0702 | Windows |
Enterprise |
DET0254
|
Monitor for anomalies in transmitted data streams, including mismatched file integrity checks, API interception, or man-in-the-middle modifications. Detect unexpected use of APIs that handle network I/O where transmitted data integrity could be manipulated. |
| AN0703 | Linux |
Enterprise |
DET0254
|
Detect alterations of transmitted data via monitoring syscalls ( |
| AN0704 | macOS |
Enterprise |
DET0254
|
Monitor system APIs such as CFNetwork and SecureTransport for anomalies in transmitted data streams. Detect mismatches in file hashes or SSL/TLS downgrade attempts that enable manipulation of transmitted data. |
| AN0705 | Windows |
Enterprise |
DET0255
|
Monitor for use of native utilities such as wevtutil.exe or PowerShell cmdlets (Get-WinEvent, Get-EventLog) to enumerate or export logs. Unusual access to security or system event channels, especially by non-administrative users or processes, should be correlated with subsequent file export or network transfer activity. |
| AN0706 | Linux |
Enterprise |
DET0255
|
Monitor for suspicious use of commands such as cat, less, grep, or journalctl accessing /var/log/ files. Abnormal enumeration of authentication logs (auth.log, secure) or bulk access to multiple logs in short time windows should be flagged. |
| AN0707 | macOS |
Enterprise |
DET0255
|
Detect abnormal access to unified logs via log show or fs_usage targeting system log files. Monitor for execution of shell utilities (cat, grep) against /var/log/system.log and for plist modifications enabling verbose logging. |
| AN0708 | IaaS |
Enterprise |
DET0255
|
Monitor for cloud API calls that export or collect guest or system logs. Abnormal use of Azure VM Agent’s CollectGuestLogs.exe or AWS CloudWatch GetLogEvents across multiple instances should be correlated with lateral movement or data staging. |
| AN0709 | ESXi |
Enterprise |
DET0255
|
Monitor ESXi shell or API access to host logs under /var/log/. Abnormal enumeration of vmkernel.log, hostd.log, or vpxa.log by unauthorized accounts should be flagged. |
| AN0710 | Linux |
Enterprise |
DET0256
|
Suspicious reuse of SSH agent sockets across multiple users or processes, anomalous access to ~/.ssh/ or /tmp/ssh-* sockets, and abnormal patterns of lateral movement via SSH without new authentication events. Defender view: detect when one process accesses another user's SSH agent or when an existing SSH connection is used to pivot unexpectedly. |
| AN0711 | macOS |
Enterprise |
DET0256
|
Unusual access to SSH agent sockets in /tmp/ or /private/tmp, process access to another user’s $SSH_AUTH_SOCK, and lateral SSH activity without corresponding login events. Defender view: correlation of socket access with anomalous network flows to internal systems. |
| AN0712 | Windows |
Enterprise |
DET0257
|
Detects extraction or mounting of container/archive files (e.g., .iso, .vhd, .zip) that originated from the Internet but whose contained files lack Zone.Identifier MOTW tagging. Correlates file creation metadata with subsequent execution of unsigned or untrusted binaries launched outside SmartScreen or Protected View. |
| AN0713 | Linux |
Enterprise |
DET0258
|
Defender observes unauthorized modification or creation of Python hook files such as |
| AN0714 | Windows |
Enterprise |
DET0259
|
Adversary installation or use of RMM software (e.g., TeamViewer, AnyDesk, ScreenConnect) followed by outbound beaconing or remote session establishment |
| AN0715 | Linux |
Enterprise |
DET0259
|
Execution of known or custom VNC/remote desktop daemons or tunneling agents that initiate external communication after launch |
| AN0716 | macOS |
Enterprise |
DET0259
|
Initiation of remote desktop sessions via AnyDesk, TeamViewer, or Chrome Remote Desktop accompanied by unexpected user logins or system modifications |
| AN0717 | IaaS |
Enterprise |
DET0260
|
Defenders may detect adversaries forging web credentials in IaaS environments by monitoring for anomalous API activity such as AssumeRole or GetFederationToken being executed by unusual principals. These events often correlate with sudden logon sessions from unfamiliar IP addresses or regions. The chain is usually secret material misuse (stolen private key or password) → API request generating a new token → access to high-value resources. |
| AN0718 | Identity Provider |
Enterprise |
DET0260
|
Forged web credentials may manifest as anomalous SAML token issuance, OpenID Connect token minting, or Zimbra pre-auth key usage. Defenders may see tokens issued without normal authentication events, multiple valid tokens generated simultaneously, or signing anomalies in IdP logs. |
| AN0719 | Windows |
Enterprise |
DET0260
|
Forged web credentials on Windows endpoints may be detected by anomalous browser cookie files, local token cache manipulations, or tools injecting tokens into sessions. Defenders may observe processes accessing LSASS or browser credential stores unexpectedly, followed by unusual logon sessions. |
| AN0720 | Linux |
Enterprise |
DET0260
|
On Linux systems, forged credentials may be injected into browser session files, curl/wget headers, or token caches in memory. Detection can leverage auditd to track processes accessing sensitive files (~/.mozilla, ~/.config/chromium, ~/.aws/credentials) and correlate with suspicious outbound connections. |
| AN0721 | macOS |
Enterprise |
DET0260
|
Forged credentials on macOS may be visible through Unified Logs showing abnormal access to Keychain or browser session files. Correlated with anomalous web session usage from Safari or Chrome processes outside typical user context. |
| AN0722 | SaaS |
Enterprise |
DET0260
|
SaaS platforms may show forged credentials as unusual API keys, tokens, or session cookies being used without corresponding authentication. Correlated patterns include simultaneous valid sessions from multiple geographies, unusual API calls with new tokens, or bypass of expected MFA enforcement. |
| AN0723 | Office Suite |
Enterprise |
DET0260
|
Forged web credentials in Office Suite contexts may appear as abnormal authentication headers in Outlook or Teams traffic, or unexplained OAuth grants in M365/Azure logs. Defenders should correlate token usage events with missing authentication flows and mismatched device/user context. |
| AN0724 | Windows |
Enterprise |
DET0261
|
Detects file reads across locations followed by writes to temp or staging directories, often compressed or encrypted, indicating local staging behavior. |
| AN0725 | Linux |
Enterprise |
DET0261
|
Detects aggregation of files from different directories into /tmp, /mnt, or user-specified directories with archiving tools like tar or gzip. |
| AN0726 | macOS |
Enterprise |
DET0261
|
Detects staged data aggregated in /Users/Shared, /private/tmp with compression tools like ditto or zip, initiated via Terminal or AppleScript. |
| AN0727 | ESXi |
Enterprise |
DET0261
|
Detects local staging behavior via snapshot creation or files written into VMFS partitions by scripts or unauthorized shell access. |
| AN0728 | Windows |
Enterprise |
DET0262
|
Monitor DNS query results where subsequent connections use derived or unusual port numbers not explicitly resolved, especially when tied to suspicious processes. Correlate Sysmon DNS logs (Event ID 22) with process creation and socket activity. |
| AN0729 | Linux |
Enterprise |
DET0262
|
Inspect resolver and audit logs for processes initiating outbound connections to ports calculated from DNS response IPs. Abnormal ephemeral port usage shortly after DNS queries can indicate DNS calculation behavior. |
| AN0730 | macOS |
Enterprise |
DET0262
|
Use unified logs to detect unusual DNS responses correlated with subsequent connections to calculated or non-standard ports. Monitor non-browser apps making repeated outbound connections that deviate from expected patterns. |
| AN0731 | ESXi |
Enterprise |
DET0262
|
Analyze ESXi syslogs for management agents or VMs making outbound connections to dynamically calculated ports derived from DNS responses. Cross-check with VM traffic baselines to identify anomalies. |
| AN0732 | SaaS |
Enterprise |
DET0263
|
Anomalous or bulk download activity from private or restricted repositories by non-developer or privileged accounts, often preceded by unusual login behavior (e.g., unfamiliar geo, OAuth token use, elevated API rate). |
| AN0733 | Windows |
Enterprise |
DET0264
|
Detects JavaScript execution through WSH (wscript.exe, cscript.exe) or HTA (mshta.exe), particularly when spawned from Office macros, web browsers, or abnormal user paths. Correlates script execution with outbound network activity or system modification. |
| AN0734 | macOS |
Enterprise |
DET0264
|
Detects JavaScript for Automation (JXA) via osascript or compiled scripts using OSAKit APIs. Flags execution involving system modification, inter-process scripting, or browser abuse. |
| AN0735 | Linux |
Enterprise |
DET0264
|
Detects Node.js or JavaScript interpreter execution from web shells, cron jobs, or local users. Correlates execution with reverse shell behavior, file modifications, or abnormal outbound connections. |
| AN0736 | macOS |
Enterprise |
DET0265
|
Abuse of launchctl to execute or manage Launch Agents and Daemons. Defender perspective: correlation of suspicious plist file creation or modification in LaunchAgents/LaunchDaemons directories with subsequent execution of the launchctl command. Abnormal executable paths (e.g., /tmp, /Shared) or launchctl activity followed by network connections are highly suspicious. |
| AN0737 | Windows |
Enterprise |
DET0266
|
Detects mailbox manipulation or deletion via PowerShell (e.g., Remove-MailboxExportRequest), file deletion from Outlook data stores (Unistore.db), or tampering with quarantined mail logs. |
| AN0738 | Linux |
Enterprise |
DET0266
|
Detects the use of mail utilities like |
| AN0739 | macOS |
Enterprise |
DET0266
|
Detects removal of Apple Mail artifacts via AppleScript or direct deletion of mailbox content in ~/Library/Mail/, especially when preceded by Remote Login or C2-related API access. |
| AN0740 | Office Suite |
Enterprise |
DET0266
|
Detects Exchange Online or on-prem transport rule changes (e.g., header stripping) and mailbox export cleanup via |
| AN0741 | Windows |
Enterprise |
DET0267
|
Persistent high CPU utilization combined with suspicious command-line execution (e.g., mining tools or obfuscated scripts) and outbound connections to mining/proxy networks. |
| AN0742 | Linux |
Enterprise |
DET0267
|
Abnormal CPU/memory usage by unauthorized processes with outbound connections to known mining pools or using cron jobs/scripts to maintain persistence. |
| AN0743 | macOS |
Enterprise |
DET0267
|
Background launch agents/daemons with high CPU use and network access to external mining services. |
| AN0744 | IaaS |
Enterprise |
DET0267
|
Sudden spikes in cloud VM CPU usage with outbound traffic to mining pools and unauthorized instance creation. |
| AN0745 | Containers |
Enterprise |
DET0267
|
High CPU usage by unauthorized containers running mining binaries or public proxy tools. |
| AN0746 | SaaS |
Enterprise |
DET0267
|
Abuse of cloud messaging platforms to send mass spam or consume quota-based resources. |
| AN0747 | Windows |
Enterprise |
DET0268
|
Detects adversarial archiving using libraries (zlib, zip APIs) invoked by scripts or binaries. Correlates process executions of Python, PowerShell, or custom .NET binaries with DLL/module loads linked to compression libraries, followed by archive file creation. |
| AN0748 | Linux |
Enterprise |
DET0268
|
Detects adversarial archiving by scripts or binaries calling compression libraries (libzip, zlib, bzip2). Correlates execution of Python, Perl, or compiled binaries with dynamic linking to archiving libraries and creation of compressed files in /tmp or user directories. |
| AN0749 | macOS |
Enterprise |
DET0268
|
Detects malicious archiving via system or third-party libraries (libz, libarchive) invoked by Python, Swift, or Objective-C binaries. Correlates unified logs of library loads with creation of compressed or encrypted archives (.zip, .gz, .bz2, .dmg). |
| AN0750 | Windows |
Enterprise |
DET0269
|
Logon via RDP or WMI by a user account followed by uncommon command execution, file manipulation, or lateral network connections. |
| AN0751 | Linux |
Enterprise |
DET0269
|
SSH session from new source IP followed by interactive shell or privilege escalation (e.g., sudo, su) and outbound lateral connection. |
| AN0752 | macOS |
Enterprise |
DET0269
|
Remote login via ARD or SSH followed by screensharingd process activity or modification of TCC-protected files. |
| AN0753 | IaaS |
Enterprise |
DET0269
|
Use of cloud-based bastion or VM console session followed by commands that initiate outbound SSH or RDP sessions from the cloud instance to other environments. |
| AN0754 | ESXi |
Enterprise |
DET0269
|
vSphere API logins (vimService) or SSH to ESXi host followed by unauthorized shell commands or lateral remote logins from the ESXi host. |
| AN0755 | Windows |
Enterprise |
DET0270
|
Adversary modifies Group Policy Objects (GPOs), domain trust, or directory service objects via GUI, CLI, or programmatic APIs. Behavior includes creation/modification of GPOs, delegation permissions, trust objects, or rogue domain controller registration. |
| AN0756 | Identity Provider |
Enterprise |
DET0270
|
Adversary modifies tenant policy through changes to federation configuration, trust settings, or identity provider additions in Microsoft 365/AzureAD via Portal, PowerShell, or Graph API. Includes setting authentication to federated or updating federated domains. |
| AN0757 | Windows |
Enterprise |
DET0271
|
Detects anomalous process access to LSASS on domain controllers, suspicious module loads of authentication DLLs, and registry or file modifications indicative of Skeleton Key–style patching. Correlates LSASS access attempts with subsequent abnormal logon activity patterns. |
| AN0758 | Network Devices |
Enterprise |
DET0272
|
Detects unauthorized modification of network device authentication by correlating OS image file changes, checksum mismatches, or memory verification failures with anomalous authentication events. Focus is on behaviors where patched images introduce hardcoded passwords or bypass native authentication. |
| AN0759 | Windows |
Enterprise |
DET0273
|
Processes that normally do not initiate network connections establishing outbound encrypted TLS/SSL sessions, especially with asymmetric traffic volumes (client sending more than receiving) or non-standard certificate chains. Defender observations correlate process creation with unexpected network encryption libraries being loaded. |
| AN0760 | Linux |
Enterprise |
DET0273
|
Processes like curl, wget, python, socat, or custom binaries initiating TLS/SSL sessions to non-standard destinations. Defender sees abnormal syscalls for connect(), loading of libssl libraries, and persistent outbound encrypted traffic from daemons not normally communicating externally. |
| AN0761 | macOS |
Enterprise |
DET0273
|
Applications or launchd jobs initiating encrypted TLS traffic to rare external hosts. Defender observes unified logs showing ssl/TLS API calls by processes not baseline-approved, and payload entropy suggesting encrypted C2 sessions. |
| AN0762 | ESXi |
Enterprise |
DET0273
|
VMware management daemons or guest processes initiating encrypted connections outside expected vCenter, update servers, or internal comms. Defender identifies hostd or vpxa initiating outbound TLS flows with uncommon destinations. |
| AN0763 | Network Devices |
Enterprise |
DET0273
|
Unusual TLS tunnels through ports not normally encrypted (e.g., TLS on port 8080, 53). Defender sees NetFlow/IPFIX or packet inspection indicating high-entropy traffic volumes and asymmetric client/server exchange ratios. |
| AN0764 | Windows |
Enterprise |
DET0274
|
Correlation of registry key modification for Run/RunOnce with abnormal parent-child process relationships and outlier execution at user logon or system startup |
| AN0765 | Linux |
Enterprise |
DET0274
|
Correlates creation/modification of systemd service files or /etc/init.d scripts with outlier process behavior during boot |
| AN0766 | macOS |
Enterprise |
DET0274
|
Observes creation or modification of LaunchAgent/LaunchDaemon property list files combined with anomalous plist payload execution after user logon |
| AN0767 | Windows |
Enterprise |
DET0275
|
An adversary leverages built-in tools such as certutil.exe, powershell.exe, or copy.exe to decode, reassemble, or extract hidden malicious content from obfuscated containers or encoded formats. The decoding utility often spawns shortly after file staging or download and may be chained with script interpreters or further payload execution. |
| AN0768 | Linux |
Enterprise |
DET0275
|
The adversary uses native utilities like base64, gzip, tar, or openssl to decode, decompress, or decrypt files that were previously staged or downloaded. These tools may be chained with curl/wget and executed via bash/zsh, often to extract an embedded payload or reverse shell script. |
| AN0769 | macOS |
Enterprise |
DET0275
|
The adversary invokes built-in scripting or decoding tools like base64, plutil, or AppleScript-based utilities to decode files embedded in staging artifacts. Decoding often occurs post-download or as part of post-exploitation payload deployment via zsh, python, or osascript. |
| AN0770 | Windows |
Enterprise |
DET0276
|
Detection of rogue Domain Controller registration and Active Directory replication abuse by correlating: (1) creation/modification of nTDSDSA and server objects in the Configuration partition, (2) unexpected usage of Directory Replication Service SPNs (GC/ or E3514235-4B06-11D1-AB04-00C04FC2DCD2), (3) replication RPC calls (DrsAddEntry, DrsReplicaAdd, GetNCChanges) originating from non-DC hosts, and (4) Kerberos authentication by non-DC machines using DRS-related SPNs. These events in combination, especially from hosts outside the Domain Controllers OU, may indicate DCShadow or rogue DC activity. |
| AN0771 | IaaS |
Enterprise |
DET0277
|
Detection of new IAM roles or policies attached to a user/service in AWS/GCP/Azure outside normal patterns or hours, often following account compromise. |
| AN0772 | Identity Provider |
Enterprise |
DET0277
|
Behavioral chain of a user being granted elevated privileges or roles in Entra ID or Okta following suspicious login or account creation activity. |
| AN0773 | Office Suite |
Enterprise |
DET0277
|
Detection of new admin or role assignment actions within Microsoft 365/O365 environments to elevate access for persistence or lateral movement. |
| AN0774 | Windows |
Enterprise |
DET0278
|
Unusual modification of boot records (MBR, VBR) or EFI partitions not associated with legitimate patch cycles or OS upgrades. Registry or WMI events associated with firmware update tools executed from unexpected parent processes. API calls (e.g., DeviceIoControl) writing directly to raw disk sectors. Subsequent abnormal boot configuration changes followed by unsigned driver loads. |
| AN0775 | Linux |
Enterprise |
DET0278
|
Detection of writes to /boot or EFI directories outside of expected package manager updates. Monitoring kernel log and auditd events for attempts to overwrite bootloader binaries (e.g., grub, shim). Unexpected execution of efibootmgr or dd writing to /dev/sdX devices followed by boot parameter changes. |
| AN0776 | macOS |
Enterprise |
DET0278
|
Abnormal modification of EFI firmware binaries in /System/Library/CoreServices/ or NVRAM parameters not associated with OS updates. Unified logs capturing calls to bless or nvram commands executed from untrusted parent processes. Sudden unsigned kext loads after EFI variable tampering. |
| AN0777 | Network Devices |
Enterprise |
DET0278
|
Unexpected firmware image uploads via TFTP/FTP/SCP. Configuration changes modifying boot image pointers. Logs showing boot variable redirection to non-standard images. Anomalous reboots immediately following firmware changes not tied to patch schedules. |
| AN0778 | Windows |
Enterprise |
DET0279
|
Monitor for abnormal creation or modification of Windows services (e.g., via sc.exe, PowerShell, or API calls) that load non-standard executables. Correlate registry changes in service keys with service creation events and process execution to detect service abuse for persistence or execution. |
| AN0779 | Linux |
Enterprise |
DET0279
|
Detect unusual invocations of systemctl, service, or init scripts creating or modifying daemons. Monitor audit logs for execution of binaries from unexpected paths linked to service start/stop activity. |
| AN0780 | macOS |
Enterprise |
DET0279
|
Monitor launchd service definitions and property list (.plist) modifications for non-standard executables. Detect unauthorized processes registered as launch daemons or agents. |
| AN0781 | Windows |
Enterprise |
DET0280
|
Behavior chain involving abnormal registry modifications via CLI, PowerShell, WMI, or direct API calls, especially targeting persistence, privilege escalation, or defense evasion keys, potentially followed by service restart or process execution. Such as editing Notify/Userinit/Startup keys, or disabling SafeDllSearchMode. |
| AN0782 | Windows |
Enterprise |
DET0281
|
Monitors for compression tool usage (e.g., 7zip, WinRAR, MakeCab) that follows or precedes file modification, suspicious file types (e.g., .exe, .dll) being compressed, or dropped from self-extracting archives followed by immediate execution. |
| AN0783 | Linux |
Enterprise |
DET0281
|
Detects sequential command-line compression utilities (e.g., gzip, tar, zip, 7z) followed by execution of unpacked files, especially in temp directories or under non-standard locations like /dev/shm or /tmp with ELF binaries. |
| AN0784 | macOS |
Enterprise |
DET0281
|
Identifies archive utilities (e.g., ditto, unzip, xar, pkgutil) used to extract payloads to non-standard paths, then correlates with execution or file permission changes (e.g., |
| AN0785 | Windows |
Enterprise |
DET0282
|
Detection focuses on identifying anomalous regsvr32.exe executions that deviate from normal administrative or system use. Defenders may observe regsvr32.exe loading scriptlets or DLLs from unusual paths (especially temporary directories or remote URLs), command-line arguments invoking /i or /u with suspicious file references, network connections initiated by regsvr32.exe, and unsigned or untrusted DLLs being loaded shortly after regsvr32.exe invocation. Correlated sequences include regsvr32.exe process creation, module load of DLL/scriptlet, and optional outbound network traffic. |
| AN0786 | Windows |
Enterprise |
DET0283
|
Detection of suspicious token manipulation chains: use of token-related APIs (e.g., LogonUser, DuplicateTokenEx) or commands (runas) → spawning of a new process under a different security context (e.g., SYSTEM) → mismatched parent-child process lineage or anomalies in Event Tracing for Windows (ETW) token/PPID data → abnormal lateral or privilege escalation activity. |
| AN0787 | Windows |
Enterprise |
DET0284
|
Unexpected processes (e.g., powershell.exe, wscript.exe, office apps) initiating HTTP POST/PUT requests to text storage domains like pastebin.com or hastebin.com, particularly when preceded by file access in sensitive directories. Defender perspective: correlation of process lineage, large clipboard/file read operations, and outbound uploads to text storage services. |
| AN0788 | Linux |
Enterprise |
DET0284
|
Use of curl, wget, or custom scripts to POST data to pastebin-like services. Defender perspective: identify chained behavior where files are compressed/read followed by HTTPS POST requests to text-sharing endpoints. |
| AN0789 | macOS |
Enterprise |
DET0284
|
Processes such as osascript, curl, or office applications sending data to text storage APIs/domains. Defender perspective: anomalous clipboard or file reads by unexpected applications immediately followed by outbound HTTPS requests to pastebin-like services. |
| AN0790 | ESXi |
Enterprise |
DET0284
|
ESXi services (vmx, hostd) generating outbound HTTPS POST requests to text storage sites. Defender perspective: anomalous datastore or log reads chained with traffic to pastebin-like destinations. |
| AN0791 | Windows |
Enterprise |
DET0285
|
A remote DCOM invocation by a privileged account using RPC (port 135), followed by abnormal process instantiation or module loading on the remote system indicative of code execution. |
| AN0792 | Windows |
Enterprise |
DET0286
|
Monitor for anomalous email activity originating from Windows-hosted applications (e.g., Outlook) where the sending account name or display name does not match the underlying SMTP address. Detect abnormal volume of outbound messages containing sensitive keywords (e.g., 'payment', 'wire transfer') or anomalous login locations for accounts associated with email sending activity. |
| AN0793 | Linux |
Enterprise |
DET0286
|
Monitor mail server logs (Postfix, Sendmail, Exim) for anomalous From headers mismatching authenticated SMTP identities. Detect abnormal relay attempts, spoofed envelope-from values, or large-scale outbound campaigns targeting internal users. |
| AN0794 | macOS |
Enterprise |
DET0286
|
Monitor Mail.app activity or unified logs for anomalous SMTP usage, including mismatches between display name and authenticated AppleID or Exchange credentials. Detect use of third-party mail utilities that attempt to send on behalf of corporate identities. |
| AN0795 | SaaS |
Enterprise |
DET0286
|
Monitor SaaS mail platforms (Google Workspace, M365, Okta-integrated apps) for SendAs/SendOnBehalfOf operations where the delegated permissions are unusual or newly granted. Detect impersonation attempts where adversaries configure rules to auto-forward or auto-reply with impersonated content. |
| AN0796 | Office Suite |
Enterprise |
DET0286
|
Monitor Office Suite applications (Outlook, Word mail merge, Excel macros) for abnormal automated message sending, especially when macros or scripts trigger email delivery. Detect patterns of impersonation language (urgent, payment, executive request) combined with anomalous execution of Office macros. |
| AN0797 | Windows |
Enterprise |
DET0287
|
Cause→effect chain: (1) A client app (browser, Office, PDF/Flash/reader) experiences a crash/abnormal exit or loads from an unusual location, then (2) drops or modifies a file in user-writable paths, and/or (3) spawns an unexpected child (e.g., powershell/cmd/mshta/rundll32/wscript/installer), and (4) establishes outbound C2-like connections shortly after. Correlate application logs, file writes, process lineage, and network egress within a short window. |
| AN0798 | Linux |
Enterprise |
DET0287
|
Cause→effect chain: (1) Browser/Office/reader process logs crash/segfault or abnormal sandbox message, (2) new executable/script/write occurs in $HOME (Downloads, ~/.cache, /tmp), (3) unexpected child like curl/wget/bash/python opens network connections soon after. |
| AN0799 | macOS |
Enterprise |
DET0287
|
Cause→effect chain: (1) App crash/abnormal termination in unified logs for Safari/Chrome/Office/Preview, (2) new files/scripts in ~/Library, ~/Downloads, /private/var/folders/*, (3) unexpected child (osascript, zsh, bash, curl) spawned by those apps, (4) new outbound connections. |
| AN0800 | macOS |
Enterprise |
DET0288
|
Correlates suspicious removal or modification of the com.apple.quarantine extended attribute, manipulation of LSFileQuarantineEnabled values in Info.plist, and unexpected process execution of unsigned or non-notarized binaries. Also monitors abnormal trust validation failures in unified logs and unusual activity in QuarantineEvents database entries. |
| AN0801 | IaaS |
Enterprise |
DET0289
|
Cloud API events where logging services are stopped, deleted, or modified in a way that disables audit visibility. Defender view: unauthorized StopLogging, DeleteTrail, or UpdateSink operations correlated with privileged user activity. |
| AN0802 | Identity Provider |
Enterprise |
DET0289
|
Disabling or modifying sign-in or audit log collection for user activities. Defender view: policy or configuration updates removing logging coverage for critical accounts. |
| AN0803 | Office Suite |
Enterprise |
DET0289
|
Disabling mailbox or tenant-level audit logging, often using Set-MailboxAuditBypassAssociation or downgrading license tiers. Defender view: sudden absence of mailbox activity logging for monitored users. |
| AN0804 | SaaS |
Enterprise |
DET0289
|
Disabling or altering security and audit logs in SaaS admin panels (e.g., Slack, Zoom, Salesforce). Defender view: API calls or admin console changes that stop event exports or logging integrations. |
| AN0805 | Linux |
Enterprise |
DET0290
|
Detects creation or modification of crontab entries by non-root users or from abnormal parent processes, followed by the execution of uncommon binaries at scheduled intervals. |
| AN0806 | macOS |
Enterprise |
DET0290
|
Detects crontab job additions or modifications via |
| AN0807 | ESXi |
Enterprise |
DET0290
|
Detects direct modification of crontab entries in /var/spool/cron/crontabs/root or /etc/rc.local.d/local.sh followed by execution of scripts linked to lateral movement or malware persistence. |
| AN0808 | IaaS |
Enterprise |
DET0291
|
Detects web console login events followed by read-only or metadata retrieval activity from GUI sources (e.g., browser session, mobile client) rather than API/CLI sources. Correlates across CloudTrail, IAM identity logs, and user-agent context. |
| AN0809 | Identity Provider |
Enterprise |
DET0291
|
Detects successful login to cloud identity portals (e.g., Okta, Azure AD, Google Identity) from atypical geolocations, devices, or user agents immediately followed by dashboard/portal navigation to sensitive pages such as user or app configuration. |
| AN0810 | Office Suite |
Enterprise |
DET0291
|
Detects login to admin consoles (e.g., Microsoft 365 Admin Center) from unrecognized users, devices, or geolocations followed by non-API data review or configuration read actions that suggest GUI dashboard use. |
| AN0811 | SaaS |
Enterprise |
DET0291
|
Detects SaaS web login followed by dashboard or web GUI page views from unfamiliar locations, devices, or access patterns. Identifies use of sensitive reporting or configuration consoles accessed from high-risk accounts. |
| AN0812 | Linux |
Enterprise |
DET0292
|
Detection of file execution where the file name contains a trailing space to masquerade as a known executable. Adversaries may exploit the way command line interpreters handle file names with trailing whitespace. |
| AN0813 | macOS |
Enterprise |
DET0292
|
Execution of renamed or dropped files with a trailing space to deceive users or analysts, especially in LaunchAgents or LaunchDaemons. |
| AN0814 | Windows |
Enterprise |
DET0293
|
Detects injection or tampering of DLLs in hybrid identity agents (e.g., AzureADConnectAuthenticationAgentService), registry or configuration changes tied to PTA/AD FS, and anomalous LSASS or AD FS module loads correlated with authentication anomalies. |
| AN0815 | Identity Provider |
Enterprise |
DET0293
|
Detects registration of new PTA agents, conditional access changes disabling hybrid MFA enforcement, or suspicious updates to AD FS token-signing configurations. |
| AN0816 | IaaS |
Enterprise |
DET0293
|
Detects API calls registering or updating hybrid identity connectors, modification of cloud-to-on-premises federation trust, and unusual token issuance logs. |
| AN0817 | Office Suite |
Enterprise |
DET0293
|
Detects tenant-wide authentication or conditional access changes that weaken hybrid identity enforcement, including disabling AD FS or bypassing hybrid MFA policies. |
| AN0818 | SaaS |
Enterprise |
DET0293
|
Detects suspicious changes to SAML/OAuth federation configurations, such as new signing certificates, altered endpoints, or claims issuance rules granting elevated privileges. |
| AN0819 | Windows |
Enterprise |
DET0294
|
User opens a file delivered by email, web, chat, or share. The handler application (Word/PDF reader/archiver) creates a file in user-controlled paths (Downloads, Temp, Desktop) and then spawns a new or unusual child process (e.g., powershell.exe, wscript.exe, cmd.exe, regsvr32.exe, rundll32.exe, msiexec.exe). Optional precursors include FileStreamCreated (URL/UNC) and Office → system32 batch writes. |
| AN0820 | macOS |
Enterprise |
DET0294
|
User opens a downloaded document/installer leading to EndpointSecurity file create in ~/Downloads or ~/Library paths then an exec of a suspicious utility (osascript, bash/zsh, curl, chmod, open with -a Terminal). Correlates File Creation with subsequent process exec and, optionally, quarantine/LSQuarantine events. |
| AN0821 | Linux |
Enterprise |
DET0294
|
User or desktop application writes a new file to ~/Downloads, /tmp, or mounted removable media followed by execve of a risky interpreter/loader (bash, sh, python, perl, php, node, curl|wget piping to sh, ld.so, rdesktop, xdg-open - with unusual args). Uses auditd PATH+SYSCALL (open/creat/write/rename) with execve event linking. |
| AN0822 | Windows |
Enterprise |
DET0295
|
Detects hijacking of an existing thread (OpenThread) through a behavioral chain involving thread suspension (SuspendThread), memory modification (VirtualAllocEx + WriteProcessMemory), context manipulation (SetThreadContext), and thread resumption—all within another live process's address space (ResumeThread). |
| AN0823 | Windows |
Enterprise |
DET0296
|
Detects suspicious DNS/ARP poisoning attempts, unauthorized modifications to registry/network configuration, or abnormal TLS downgrade activity. Correlates changes in system configuration with subsequent unusual network flows or authentication events. |
| AN0824 | Linux |
Enterprise |
DET0296
|
Detects unauthorized edits to /etc/hosts, /etc/resolv.conf, or suspicious ARP broadcasts. Correlates file modifications with subsequent unexpected network sessions or service creation. |
| AN0825 | macOS |
Enterprise |
DET0296
|
Detects unauthorized edits to system configuration profiles, unexpected certificate trust changes, or abnormal ARP/DNS patterns indicative of interception. |
| AN0826 | Network Devices |
Enterprise |
DET0296
|
Detects unauthorized firmware or configuration changes enabling adversary-in-the-middle positioning (e.g., route injection, DNS spoofing, SSL downgrade). Behavioral analytics focus on sudden changes to routing tables or image file integrity failures. |
| AN0827 | Windows |
Enterprise |
DET0297
|
Processes attempting raw disk access to overwrite sensitive structures such as the MBR or partition table using \.\PhysicalDrive notation. Detection relies on correlating process creation, privilege escalation, and raw sector writes in Sysmon and Security logs. |
| AN0828 | Linux |
Enterprise |
DET0297
|
Execution of utilities (dd, hdparm, sgdisk) or custom binaries attempting to overwrite disk boot structures (/dev/sda MBR sector or partition tables). Detection correlates shell execution with syscalls writing to sector 0 or disk metadata blocks. |
| AN0829 | macOS |
Enterprise |
DET0297
|
Abnormal invocation of diskutil or asr that modifies partition tables or initializes raw devices. Monitor for IOKit system calls targeting disk headers or EFI boot sectors, correlated with elevated privileges. |
| AN0830 | Network Devices |
Enterprise |
DET0297
|
Execution of destructive CLI commands such as format flash:, format disk, or equivalent vendor-specific commands that erase filesystem structures. Detection correlates AAA logs showing privileged access with immediate format/erase commands. |
| AN0831 | Windows |
Enterprise |
DET0298
|
Detects adversarial archiving using built-in or third-party utilities (makecab, diantz, xcopy, certutil, 7z, WinRAR, WinZip). Correlates suspicious process creation events with command-line arguments for compression/encoding, followed by creation of archive files (.cab, .zip, .7z, .rar). Identifies anomalous loading of crypt32.dll for encryption operations or execution of diantz.exe to compress remotely staged files. |
| AN0832 | Linux |
Enterprise |
DET0298
|
Detects execution of archiving utilities (tar, gzip, bzip2, xz, zip, openssl) followed by suspicious archive file creation. Correlates archive creation in temporary or staging directories with execution of commands involving compression or encryption options. |
| AN0833 | macOS |
Enterprise |
DET0298
|
Detects invocation of macOS-native archiving utilities (zip, ditto, hdiutil) or openssl used for encryption. Correlates execution with archive or encrypted file creation (.zip, .dmg, .tar.gz) in user or temporary directories. Identifies anomalous use of archiving commands by Office applications or daemons. |
| AN0834 | Windows |
Enterprise |
DET0299
|
Sequential behavioral chain of privilege escalation through permission modification: (1) Process creation of permission-modifying utilities (icacls, takeown, attrib, cacls), (2) Correlation with unusual user context or timing, (3) DACL modification events targeting sensitive files/directories, (4) Subsequent file access or modification attempts indicating successful privilege bypass |
| AN0835 | Linux |
Enterprise |
DET0299
|
Behavioral sequence of unauthorized privilege escalation via permission modification: (1) chmod/chown/setfacl process execution with suspicious parameters, (2) Targeting of critical system files or unusual permission values, (3) Correlation with non-privileged user context or unusual timing patterns, (4) Follow-on file access indicating successful permission bypass |
| AN0836 | macOS |
Enterprise |
DET0299
|
macOS-specific permission modification behavioral chain: (1) chmod/chown/chflags process execution, (2) System Integrity Protection (SIP) bypass attempts, (3) Extended attribute (xattr) modifications, (4) Unified log correlation with file system events, (5) Subsequent access to previously restricted resources |
| AN0837 | ESXi |
Enterprise |
DET0299
|
ESXi hypervisor permission modification behavioral chain: (1) SSH access to ESXi host, (2) chmod/chown execution on VMFS datastore files or system configuration, (3) Modification of VM configuration files (.vmx) or virtual disk permissions, (4) Hostd service log correlation, (5) vCenter permission change events if centrally managed |
| AN0838 | Windows |
Enterprise |
DET0300
|
Detect anomalous chains of memory allocation and execution inside the same process (e.g., VirtualAlloc → memcpy → VirtualProtect → CreateThread). Unlike process injection, reflective code loading does not perform cross-process memory writes — the suspicious activity occurs entirely within the process’s own PID context. |
| AN0839 | Linux |
Enterprise |
DET0300
|
Monitor for in-process mmap + mprotect + execve/execveat activity where memory permissions are changed from writable to executable inside the same process without a corresponding ELF on disk. |
| AN0840 | macOS |
Enterprise |
DET0300
|
Suspicious calls to dlopen(), dlsym(), or mmap with RWX flags in processes that do not typically perform dynamic module loading. Monitor anonymous memory regions executed by user processes. |
| AN0841 | Windows |
Enterprise |
DET0301
|
Execution of files originating from removable media after drive mount, with correlation to file write activity, autorun usage, or lateral spread via staged tools. |
| AN0842 | Windows |
Enterprise |
DET0302
|
A remote source rapidly touches a short sequence of closed ports (SYN→RST/S0) on a Windows host. Within a short window the host changes firewall state (WFP rule added/modified or service starts listening) and then the same source completes the first successful handshake to the newly opened port. |
| AN0843 | Linux |
Enterprise |
DET0302
|
A source performs a short closed-port sequence; the host then modifies iptables/nftables/ufw rules or starts a daemon binding a new socket, followed by a successful connection from the same source. |
| AN0844 | macOS |
Enterprise |
DET0302
|
A source performs a closed-port sequence; the endpoint enables a PF/socketfilterfw rule or a background process binds a port; then a successful connection completes from the same source. |
| AN0845 | Network Devices |
Enterprise |
DET0302
|
Router/switch receives a knock pattern (same src touches device unicast, broadcast, and network-address on same or stepped ports) followed by ACL/line-vty/service enable and the first mgmt session success. |
| AN0846 | Windows |
Enterprise |
DET0303
|
Adversary enumeration of local user accounts using Net.exe, WMI, or PowerShell. |
| AN0847 | Linux |
Enterprise |
DET0303
|
Enumeration of local users or groups via file access (/etc/passwd) or commands like id, groups. |
| AN0848 | macOS |
Enterprise |
DET0303
|
Enumeration of macOS local users using dscl, id, dscacheutil, or /etc/passwd access. |
| AN0849 | ESXi |
Enterprise |
DET0303
|
Enumeration of local ESXi accounts using esxcli or vSphere API from unauthorized sessions. |
| AN0850 | Windows |
Enterprise |
DET0304
|
Exploitation of system or application vulnerability (e.g., CVE-based exploit) followed by service crash, restart, or repeated failure within a short time frame, impacting application/system availability. |
| AN0851 | Linux |
Enterprise |
DET0304
|
User or remote input triggers application crash or segmentation fault (e.g., SIGSEGV) with service recovery attempts, observed via audit logs and systemd journaling. |
| AN0852 | macOS |
Enterprise |
DET0304
|
Application crash or repeated restart cycle triggered by malformed input or exploit file, observed via unified logs and process crash monitoring. |
| AN0853 | IaaS |
Enterprise |
DET0304
|
Cloud workload exploitation leads to repeated container, service, or VM termination/restart, typically associated with CVE-based crash triggers or fuzzed payloads. |
| AN0854 | Windows |
Enterprise |
DET0305
|
Adversary modifies GPO containers or files under SYSVOL using LDAP, ADSI, PowerShell (e.g., New-GPOImmediateTask) or GUI tools. This includes directory object changes (e.g., gPCFileSysPath), delegation assignments (SeEnableDelegationPrivilege), and SYSVOL file writes (ScheduledTasks.xml, GptTmpl.inf). |
| AN0855 | Network Devices |
Enterprise |
DET0306
|
Defender observes configuration changes on firewall/network appliance involving rule creation, modification, or deletion from abnormal management IPs or non-console channels (e.g., remote CLI, API). These are often correlated with a spike in previously blocked outbound traffic, unexpected allow-all rules, or bulk rule deletions. Behavior often follows unauthorized login, privilege escalation, or API abuse. |
| AN0856 | Windows |
Enterprise |
DET0307
|
Correlated file access to insecure credential files (e.g., .env, .xml, *.ps1) followed by suspicious process execution or authentication using retrieved credentials. Detected through Sysmon logs and Windows Security Event logs. |
| AN0857 | Linux |
Enterprise |
DET0307
|
File reads or process executions involving insecurely stored credential files (e.g., config files with password fields) by non-root or anomalous users followed by ssh authentication attempts. |
| AN0858 | macOS |
Enterprise |
DET0307
|
Terminal-based grep or open of plist/config files containing credentials, correlated with Keychain or system login attempts. |
| AN0859 | Containers |
Enterprise |
DET0307
|
Container processes accessing mounted secrets or configuration paths (e.g., /run/secrets, /mnt/config) followed by network access or credential use. |
| AN0860 | IaaS |
Enterprise |
DET0307
|
Access to local credential/config files (e.g., ~/.aws/credentials) followed by metadata API calls or cloud role assumptions. |
| AN0861 | IaaS |
Enterprise |
DET0308
|
Detection focuses on identifying unauthorized or anomalous changes to compute infrastructure components. Defender perspective: monitor for creation, deletion, or modification of instances, volumes, and snapshots outside of approved change management windows; correlate abnormal activity such as rapid snapshot creation followed by new instance mounts, or repeated infrastructure changes by rarely used accounts. Flagging activity linked to unusual geolocation, API client, or automation script is suspicious. |
| AN0862 | Windows |
Enterprise |
DET0309
|
Adversary ships a tampered application or update: an updater/installer (msiexec/setup/update.exe/vendor service) writes or replaces binaries; on first run it spawns scripts/shells or unsigned DLLs and beacons to non-approved update CDNs/hosts. Detection correlates: (1) process creation of installer/updater → (2) file metadata changes in program paths → (3) first-run children and module/signature anomalies → (4) outbound connections to unexpected hosts within a short window. |
| AN0863 | Linux |
Enterprise |
DET0309
|
A compromised package/update (deb/rpm/tarball/AppImage/vendor updater) is installed, writing/overwriting files in /usr/local/bin, /usr/bin, /opt, or ~/.local; first run executes unexpected shells/curl/wget and connects to unapproved hosts. Correlate package/updater execution → file writes/replace → first-run child processes → egress. |
| AN0864 | macOS |
Enterprise |
DET0309
|
A tampered app/pkg/notarized update is installed via installer, softwareupdated, Homebrew, or vendor updater; new Mach-O or bundle contents appear in /Applications, /Library, /usr/local or /opt/homebrew; first run spawns sh/zsh/osascript/curl and makes egress to unfamiliar domains; AMFI/Gatekeeper may log signature/notarization problems. |
| AN0865 | Windows |
Enterprise |
DET0310
|
Detects unauthorized additions of users or machine accounts to privileged local or domain groups (e.g., Administrators, Remote Desktop Users). |
| AN0866 | Linux |
Enterprise |
DET0310
|
Detects unexpected use of usermod, gpasswd, or direct modification of /etc/group to elevate user group membership. |
| AN0867 | macOS |
Enterprise |
DET0310
|
Detects use of |
| AN0868 | Windows |
Enterprise |
DET0311
|
Detection of inconsistencies between reported sensor health and actual process/service state. For example, Windows Defender tray icon/UI showing healthy status while corresponding Defender services (WinDefend, MsMpEng) are stopped or disabled. Correlates process creation events with missing or terminated security processes and spoofed health events. |
| AN0869 | Linux |
Enterprise |
DET0311
|
Monitoring for discrepancies between system daemon/service state and reported health messages (e.g., syslog shows AV/IDS daemon stopped, but spoofed messages claim it is still running). Detects userland processes impersonating AV/IDS command-line outputs or modifying log forwarding configurations. |
| AN0870 | macOS |
Enterprise |
DET0311
|
Detection of fake or spoofed macOS Security & Privacy GUIs showing healthy status after XProtect, Gatekeeper, or AV processes are disabled. Correlates user-space UI process creation with terminated or missing security daemons. |
| AN0871 | Windows |
Enterprise |
DET0312
|
Multi-event correlation of Registry creation under Active Setup with anomalous execution of processes at user logon. Behavioral patterns include creation/modification of HKLM Active Setup keys with non-standard StubPath values, followed by process execution from uncommon paths, unsigned binaries, or unusual parent-child lineage post-user login. |
| AN0872 | Windows |
Enterprise |
DET0313
|
Detection of browser-based or email client-driven file creation (often from temp directories) following navigation to or execution of HTML files containing JavaScript Blob APIs or base64 Data URLs, with follow-on execution of the dropped payload. Leveraging Sysmon EventID 15 to inspect Zone.Identifier ADS for HostUrl/ReferrerUrl indicators (e.g., HostUrl=about:internet). Optional: absence of a large HTTP download record for the same URL/client in proxy logs (suggests local assembly) |
| AN0873 | Linux |
Enterprise |
DET0313
|
Detection of browser-based downloads from HTML sources that trigger file creation in temp or user directories followed by execution of new files within short timeframes and suspicious parent-child lineage. |
| AN0874 | macOS |
Enterprise |
DET0313
|
Detection of HTML-based downloads via Safari/Chrome that create obfuscated files (e.g., .zip, .app, .js) in user directories and are followed by suspicious executions from preview or launch services. |
| AN0875 | Windows |
Enterprise |
DET0314
|
Detects suspicious execution of network monitoring tools (e.g., Wireshark, tshark, Microsoft Message Analyzer), driver loading indicative of promiscuous mode, or non-admin user privilege escalation to access NICs for capture. |
| AN0876 | Linux |
Enterprise |
DET0314
|
Correlates interface mode changes to promiscuous with execution of sniffing tools like tcpdump, tshark, or custom pcap libraries. Detects abnormal NIC configurations and unauthorized sniffing from non-root sessions. |
| AN0877 | macOS |
Enterprise |
DET0314
|
Detects enabling of interface sniffing via packet capture tools or AppleScript triggering |
| AN0878 | IaaS |
Enterprise |
DET0314
|
Detects creation of traffic mirroring sessions (e.g., AWS VPC Traffic Mirroring, Azure vTAP) that redirect traffic from critical assets to other virtual instances, often followed by file creation or session establishment. |
| AN0879 | Network Devices |
Enterprise |
DET0314
|
Detects execution of capture commands via CLI ( |
| AN0880 | Windows |
Enterprise |
DET0315
|
Adversaries create the 'Office Test\Special\Perf' registry key and specify a malicious DLL path that is auto-loaded when an Office application starts. This DLL is injected into the Office process memory space and can provide persistent execution without requiring macro enablement. |
| AN0881 | Office Suite |
Enterprise |
DET0315
|
Office application auto-loads a non-standard DLL during startup triggered via Office Test Registry key, often without macro warning banners. DLL persistence mechanism circumvents traditional macro defenses. |
| AN0882 | Windows |
Enterprise |
DET0316
|
Processes attempting raw disk access via \.\PhysicalDrive paths, abnormal file I/O to MBR/boot sectors, or loading of third-party drivers (e.g., RawDisk) that enable disk overwrite. Correlate process creation, privilege usage, and disk modification events within a short time window. |
| AN0883 | Linux |
Enterprise |
DET0316
|
Execution of destructive utilities (dd, shred, wipe) targeting block devices, or processes invoking syscalls to directly overwrite /dev/sd or /dev/nvme partitions. Correlate abnormal file write attempts with shell process execution and block device access. |
| AN0884 | macOS |
Enterprise |
DET0316
|
Abnormal invocation of diskutil or asr with destructive flags (eraseDisk, zeroDisk), or low-level IOKit calls that overwrite raw disk content. Detect correlation between elevated process execution and disk erase operations. |
| AN0885 | Network Devices |
Enterprise |
DET0316
|
Execution of CLI commands erasing file systems or storage (erase flash:, format disk, erase nvram:). Detect authentication events followed by destructive commands within the same privileged session. |
| AN0886 | Windows |
Enterprise |
DET0317
|
Unusual service stop events, termination of AV/EDR processes, registry modifications disabling security tools, and firewall/defender configuration changes. Correlate process creation with service stop requests and registry edits. |
| AN0887 | Linux |
Enterprise |
DET0317
|
Execution of commands that stop or kill processes associated with logging or security daemons (auditd, syslog, falco). Detect modifications to iptables or disabling SELinux/AppArmor enforcement. Correlate sudo/root context with abrupt service halts. |
| AN0888 | macOS |
Enterprise |
DET0317
|
Execution of commands or APIs that disable Gatekeeper, XProtect, or system integrity protections. Detect configuration changes through unified logs. Monitor termination of system security daemons (e.g., syspolicyd). |
| AN0889 | Containers |
Enterprise |
DET0317
|
Modification of container runtime security profiles (AppArmor, seccomp) or removal of monitoring agents within containers. Detect unauthorized mounting/unmounting of host /proc or /sys to disable logging or auditing. |
| AN0890 | ESXi |
Enterprise |
DET0317
|
Unusual ESXi shell commands disabling syslog forwarding or stopping hostd/vpxa daemons. Detect modifications to firewall rules on ESXi host or disabling of lockdown mode. |
| AN0891 | IaaS |
Enterprise |
DET0317
|
Cloud control plane actions disabling security services (CloudTrail logging, GuardDuty, Security Hub). Detect IAM role abuse correlating with service disable events. |
| AN0892 | Identity Provider |
Enterprise |
DET0317
|
Changes to security configurations such as disabling MFA requirements, reducing session token lifetimes, or turning off risk-based policies. Correlate admin logins with sudden policy downgrades. |
| AN0893 | Network Devices |
Enterprise |
DET0317
|
Execution of commands disabling AAA, logging, or security features on routers/switches. Detect privilege escalation followed by config changes that disable defense mechanisms. |
| AN0894 | Office Suite |
Enterprise |
DET0317
|
Disabling of security macros or safe mode settings within Word/Excel/Outlook. Detect registry edits or configuration file changes that weaken macro enforcement. |
| AN0895 | Windows |
Enterprise |
DET0318
|
Processes such as PowerShell, Git, or curl initiating outbound HTTPS POST requests to known code repository APIs (e.g., github.com, gitlab.com) immediately following large file reads. Defender view: correlation between file access of sensitive directories (e.g., Documents, Finance) and abnormal data uploads to repository domains. |
| AN0896 | Linux |
Enterprise |
DET0318
|
Processes like git, curl, or python scripts executing commands that package files (tar, gzip) followed by HTTPS uploads to code repository endpoints. Defender view: detect unusual git push activity or scripted HTTPS requests outside normal developer work hours. |
| AN0897 | macOS |
Enterprise |
DET0318
|
Office or scripting applications initiating unusual HTTPS traffic to code repository APIs with high outbound-to-inbound ratios. Defender perspective: monitor for sensitive file access in combination with network connections to github.com, gitlab.com, or bitbucket.org. |
| AN0898 | ESXi |
Enterprise |
DET0318
|
ESXi host processes (vmx, hostd) initiating HTTPS sessions toward external code repositories. Defender perspective: detect datastore reads followed by outbound web traffic inconsistent with administrative baselines. |
| AN0899 | Identity Provider |
Enterprise |
DET0319
|
Adversaries create user accounts via identity provider APIs or admin portals (e.g., Azure AD, Okta). These accounts may be assigned elevated privileges or used in chained authentication. Detection monitors Add User activity from suspicious IPs or automation sources, followed by role/permission escalation. |
| AN0900 | IaaS |
Enterprise |
DET0319
|
Adversaries use cloud API, CLI, or console to create IAM users or roles. Initial CreateUser is followed by policy/role attachment. Detection monitors temporal chains involving IAM:CreateUser, AttachUserPolicy, and credential generation, especially from automation or foreign IP ranges. |
| AN0901 | SaaS |
Enterprise |
DET0319
|
Adversaries create SaaS accounts via admin dashboards or integrations (e.g., Zoom, Salesforce, Slack). Monitor lifecycle.create or account provisioning events from non-standard sources or times. |
| AN0902 | Office Suite |
Enterprise |
DET0319
|
Adversaries leverage M365 or Google Workspace APIs to create users, service accounts, or guest accounts. Follow-on behaviors include login activity, role escalation, or service principal token generation. |
| AN0903 | Windows |
Enterprise |
DET0320
|
Detects usage of commands or binaries (e.g., netstat, PowerShell Get-NetTCPConnection) and WMI or API calls to enumerate local or remote network connections. |
| AN0904 | Linux |
Enterprise |
DET0320
|
Detects use of netstat, ss, lsof, or custom shell scripts to list current network connections. Often paired with privilege escalation or staging. |
| AN0905 | macOS |
Enterprise |
DET0320
|
Detects shell-based enumeration of active connections using |
| AN0906 | ESXi |
Enterprise |
DET0320
|
Detects shell or API usage of |
| AN0907 | Network Devices |
Enterprise |
DET0320
|
Detects interactive or automated use of CLI commands like |
| AN0908 | IaaS |
Enterprise |
DET0320
|
Detects enumeration of cloud network interfaces, VPCs, subnets, or peer connections using CLI or SDKs (e.g., AWS CLI, Azure CLI, GCloud CLI). |
| AN0909 | Windows |
Enterprise |
DET0321
|
Unusual execution of virtualization binaries (VBoxManage.exe, vmware-vmx.exe, vmwp.exe) with headless or suppressed notification arguments. Registry and service modifications linked to virtualization installs. Defender view: anomalies in process creation, service metadata, and registry writes tied to enabling hidden VMs. |
| AN0910 | Linux |
Enterprise |
DET0321
|
Execution of QEMU, KVM, or VirtualBox processes with unusual flags (e.g., '-nographic', '-snapshot'). File creation of VM images in atypical directories. Defender view: monitoring audit logs for process executions and file modifications linked to hidden virtualization. |
| AN0911 | macOS |
Enterprise |
DET0321
|
Execution of virtualization binaries (Parallels, VMware Fusion, VirtualBox) with arguments to hide UI. File monitoring for plist modifications indicating hidden virtualization behavior. Defender perspective: tracking process lineage and file modifications in system configs. |
| AN0912 | ESXi |
Enterprise |
DET0321
|
Direct execution of /bin/vmx or presence of rogue .vmx files not registered in vCenter inventory. Defender perspective: anomalous commands in shell history, edits to rc.local.d/local.sh for persistence. |
| AN0913 | Windows |
Enterprise |
DET0322
|
Detects the presence of executables with high NOP padding, unusually large binary size for their function, and follow-on execution or memory injection from such files, especially when originating from temp or user-space paths. |
| AN0914 | Linux |
Enterprise |
DET0322
|
Detects ELF binaries written to disk that demonstrate anomalous file size or entropy, quickly followed by execution or memory region writes into remote processes (e.g., using ptrace). |
| AN0915 | macOS |
Enterprise |
DET0322
|
Identifies Mach-O binaries dropped into temporary directories with abnormally high binary size or padding patterns, followed by privilege escalation, |
| AN0916 | Windows |
Enterprise |
DET0323
|
Detection of anomalous driver and firmware interactions, including unsigned or unexpected firmware updates, driver loads linked to hardware components, and suspicious use of privileged APIs to read/write firmware or controller memory. |
| AN0917 | Linux |
Enterprise |
DET0323
|
Detection of suspicious use of ioctl/sysfs calls to access device firmware, unexpected flashing tools execution, and anomalous firmware checksums logged by SMART or kernel audit mechanisms. |
| AN0918 | macOS |
Enterprise |
DET0323
|
Detection of EFI/firmware manipulation attempts via abnormal driver loads, unsigned kexts, or tampered NVRAM variables associated with component firmware configuration. |
| AN0919 | Windows |
Enterprise |
DET0324
|
Identifies self-modifying executables that exhibit changes in binary hash, entropy, or memory sections during or between executions—often tied to dynamic unpacking or decryption behaviors. |
| AN0920 | Linux |
Enterprise |
DET0324
|
Detects files or processes where execution results in frequent re-creation or modification of ELF binaries or interpreter scripts, often using chmod + execve with abnormal entropy. |
| AN0921 | macOS |
Enterprise |
DET0324
|
Tracks modification of executables or interpreter payloads (e.g., Mach-O, dylib) that mutate across runs—using scripting engines, JIT compilers, or side-loaded plugins. |
| AN0922 | Windows |
Enterprise |
DET0325
|
Unusual process (e.g., |
| AN0923 | Linux |
Enterprise |
DET0325
|
|
| AN0924 | macOS |
Enterprise |
DET0325
|
AppleScript or terminal sessions launch tools ( |
| AN0925 | ESXi |
Enterprise |
DET0325
|
ESXi shell or guest VM tools initiate external connections via scripted traffic forwarding to Internet-based proxies. Detected by firewall or shell audit logs showing outbound connection spikes from hypervisor or guest VM to remote proxy nodes. |
| AN0926 | Network Devices |
Enterprise |
DET0325
|
Changes to NAT/firewall policies enabling outbound port forwarding from internal IPs to Internet-based proxy endpoints. Log spikes in outbound flows to CDN, VPS, or anomalous ASNs with few return packets. |
| AN0927 | Windows |
Enterprise |
DET0326
|
A process/script constructs or references a custom/alphabet translation table (e.g., 64/85/32+ arbitrary chars, XOR/base-N loops) or emits long high-entropy strings that do NOT validate as standard Base64/Hex → shortly after, the same process (or its child) generates outbound traffic with asymmetric bytes_out:bytes_in, fixed-size beacons, or protocol/header mismatches (e.g., Content-Type says JSON but body fails JSON parse / contains non-standard alphabet). |
| AN0928 | Linux |
Enterprise |
DET0326
|
Shell scripts or binaries implement custom mapping tables (tr/sed/awk/golang/rust/python encode loops), or emit long high-entropy tokens that fail Base64/Hex validation → correlated with egress showing asymmetric flow, protocol-mismatch payloads, or DNS/HTTP bodies containing low-diversity-but-long custom alphabets. |
| AN0929 | macOS |
Enterprise |
DET0326
|
EndpointSecurity/Unified Logs show processes generating custom alphabets or long high-entropy, non-standard tokens → network logs (PF/Zeek/EDR) show asymmetric beacons, protocol mismatches, or periodic fixed-size posts. |
| AN0930 | ESXi |
Enterprise |
DET0326
|
ESXi shell or scripts produce long, high-entropy tokens (non-standard alphabets) in shell.log/hostd, followed by outbound flows (NSX/Zeek) with asymmetric ratios or protocol mismatches to non-management endpoints. |
| AN0931 | Windows |
Enterprise |
DET0327
|
Remote Desktop (RDP) logon by a user followed by unusual process execution, file access, or lateral movement activity within a short timeframe. |
| AN0932 | Windows |
Enterprise |
DET0328
|
Execution of CMSTP.exe with arguments pointing to suspicious or remote INF/SCT/DLL payloads, optionally followed by outbound network connections to untrusted IPs, process injection via COM interfaces (CMSTPLUA, CMLUAUTIL), registry modifications registering malicious profiles, or creation of suspicious INF/DLL/SCT files prior to execution. |
| AN0933 | Windows |
Enterprise |
DET0329
|
Process chains that use native utilities (vssadmin, wbadmin, diskshadow, bcdedit, REAgentC, wmic) with arguments to delete shadow copies, disable recovery, or remove backup catalogs |
| AN0934 | Linux |
Enterprise |
DET0329
|
Shell utilities or scripts deleting |
| AN0935 | ESXi |
Enterprise |
DET0329
|
ESXi shell or vim-cmd execution that deletes all VM snapshots using vmsvc/snapshot.removeall or rm on snapshot paths |
| AN0936 | Network Devices |
Enterprise |
DET0329
|
Execution of |
| AN0937 | IaaS |
Enterprise |
DET0329
|
Cloud API calls disabling snapshot scheduling, backup policies, versioning, followed by DeleteSnapshot/DeleteVolume operations |
| AN0938 | macOS |
Enterprise |
DET0330
|
Correlation of package install event with execution of postinstall scripts containing unknown binaries or abnormal CLI usage. Look for |
| AN0939 | Linux |
Enterprise |
DET0330
|
Detection of maintainer scripts (e.g., postinst, preinst) being modified or executed during dpkg or rpm operations. Watch for script content that spawns additional processes or writes outside package scope. |
| AN0940 | Windows |
Enterprise |
DET0330
|
Detection of msiexec.exe running installer packages that result in anomalous process creation. Look for unexpected binaries executed by msiexec or custom action DLLs in the temp directory. |
| AN0941 | Windows |
Enterprise |
DET0331
|
Detects the use of message-based injection by monitoring for sequences involving FindWindow (EnumWindows or EnumChildWindows), VirtualAllocEx or related API calls, combined with suspicious PostMessage/SendMessage (e.g., LVM_SETITEMPOSITION) use to SysListView32 controls, followed by LVM_SORTITEMS invocation instead of WriteProcessMemory. |
| AN0942 | Windows |
Enterprise |
DET0332
|
Detects execution of AutoHotKey or AutoIT interpreters or compiled scripts used for unauthorized automation, command execution, or payload delivery, correlated with anomalous process lineage, command-line arguments, or script creation events. |
| AN0943 | Windows |
Enterprise |
DET0333
|
Detects creation of scheduled tasks via |
| AN0944 | Linux |
Enterprise |
DET0333
|
Detects usage of |
| AN0945 | macOS |
Enterprise |
DET0333
|
Detects user or root invocation of |
| AN0946 | Containers |
Enterprise |
DET0334
|
Implantation of malicious code into container images followed by registry push and use in new deployments. |
| AN0947 | IaaS |
Enterprise |
DET0334
|
Creation or modification of cloud virtual machine images (AMIs, custom images) with persistence mechanisms, followed by infrastructure provisioning that uses these implanted images. |
| AN0948 | macOS |
Enterprise |
DET0335
|
Detects anomalous use of macOS XPC services for code execution. Monitors for processes invoking privileged XPC daemons with abnormal parameters, unexpected binaries communicating over NSXPCConnection, or helper tools executing code outside of their expected parent process lineage. Correlates process access attempts to system-level daemons, privilege escalations via XPC misconfigurations, and injection of malicious payloads through inter-process communication. |
| AN0949 | Windows |
Enterprise |
DET0336
|
Monitors for unexpected modifications of system or application binaries, particularly signed executables. Correlates file write events with subsequent unsigned or anomalously signed process execution, and checks for tampered binaries outside normal patch cycles. |
| AN0950 | Linux |
Enterprise |
DET0336
|
Detects modification of system or application binaries by monitoring /usr/bin, /bin, and other privileged directories. Correlates file integrity monitoring (FIM) events with unexpected process executions or service restarts. |
| AN0951 | macOS |
Enterprise |
DET0336
|
Monitors binary modification in /Applications and system library paths. Detects unsigned or improperly signed binaries executed after modification. Tracks Gatekeeper or notarization bypass attempts tied to modified binaries. |
| AN0952 | ESXi |
Enterprise |
DET0336
|
Detects unauthorized modification of host binaries, modules, or services within ESXi. Correlates tampered files with subsequent unexpected service behavior or malicious module load attempts. |
| AN0953 | IaaS |
Enterprise |
DET0337
|
Defenders can detect suspicious reversion of cloud compute instances by monitoring for unusual snapshot restores, rollback actions, or ephemeral storage resets that occur outside expected administrative workflows. From a defender’s perspective, relevant detection chains include: a snapshot restore triggered by a new or rarely used account, a sequence of snapshot creation immediately followed by a restore and instance start, or rollbacks performed from anomalous geographic or network locations. These patterns may indicate attempts to remove forensic evidence or re-establish a clean execution state for persistence. |
| AN0954 | Windows |
Enterprise |
DET0338
|
Use of stolen Kerberos tickets or token impersonation resulting in logon sessions from accounts without expected interactive logon events. |
| AN0955 | Linux |
Enterprise |
DET0338
|
Access tokens or SSH keys used without corresponding login shell or PAM module activity, particularly for remote execution. |
| AN0956 | Identity Provider |
Enterprise |
DET0338
|
Token replay or impersonation in federated logins without interactive browser session or MFA prompts. |
| AN0957 | SaaS |
Enterprise |
DET0338
|
Unusual reuse of OAuth access tokens from different geographic regions, without full login events. |
| AN0958 | Containers |
Enterprise |
DET0338
|
Container process uses mounted cloud credentials or token cache to authenticate without known orchestration. |
| AN0959 | Office Suite |
Enterprise |
DET0338
|
Access token reuse to connect to SharePoint or Outlook APIs without interactive user context. |
| AN0960 | IaaS |
Enterprise |
DET0338
|
Use of instance metadata tokens across instances or misuse of short-lived tokens issued for different roles. |
| AN0961 | Network Devices |
Enterprise |
DET0339
|
Defenders may observe unauthorized modifications to encryption-related configuration files, firmware, or crypto modules on network devices. Suspicious patterns include changes to cipher suite configurations, unexpected firmware updates affecting crypto libraries, disabling of hardware cryptographic accelerators, or reductions in key length policies. Correlating configuration changes with anomalies in encrypted traffic characteristics (e.g., weaker ciphers or sudden plaintext transmission) strengthens detection. |
| AN0962 | Windows |
Enterprise |
DET0340
|
A user is socially engineered (web page, email, document) to open Run/PowerShell/CMD and paste an obfuscated one-liner. The chain is: (1) user context active in a browser/email/office app → (2) process creation of a command interpreter with suspicious arguments (base64/Invoke-Expression/web download/pipeline to shell) → (3) optional file drop in %TEMP% or %APPDATA% → (4) outbound network connection to an external domain. Events are correlated within a short window and with consistent user/session. |
| AN0963 | Linux |
Enterprise |
DET0340
|
User pastes a multi-line or one-liner into a terminal (bash/zsh) that downloads/decodes and executes content. Chain: terminal exec of curl/wget/bash/sh with pipe to interpreter or base64-decode → transient file under /tmp|~/.cache → immediate outbound egress. |
| AN0964 | macOS |
Enterprise |
DET0340
|
User pastes an obfuscated command into Terminal.app/iTerm2 that decodes or downloads code and executes. Detects Terminal/iTerm2 spawning bash/zsh/python with suspicious pipeline/base64 patterns followed by file writes in ~/Library or /tmp and outbound network connections. |
| AN0965 | Windows |
Enterprise |
DET0341
|
Detection of clipboard access via OS utilities (e.g., clip.exe, Get-Clipboard) by non-interactive or abnormal parent processes, potentially chained with staging or exfiltration commands. |
| AN0966 | macOS |
Enterprise |
DET0341
|
Detection of pbpaste/pbcopy clipboard access by processes without terminal sessions or linked to launch agents, potentially staged for collection. |
| AN0967 | Linux |
Enterprise |
DET0341
|
Detection of xclip or xsel access to clipboard buffers outside of user terminal context, especially when chained to staging (gzip, base64) or network exfiltration (curl, scp). |
| AN0968 | Windows |
Enterprise |
DET0342
|
Execution of hh.exe to open a .chm file followed by suspicious child processes or script engine invocation (VBScript, JScript, mshta, powershell). Behavior includes loading a CHM file from untrusted locations, or immediately spawning commands indicative of payload execution. |
| AN0969 | Windows |
Enterprise |
DET0343
|
High-volume packet generation by local processes (e.g., PowerShell, cmd, curl.exe) or network service processes resulting in excessive outbound traffic over short time window, correlated with abnormal resource usage or degraded host responsiveness. |
| AN0970 | Linux |
Enterprise |
DET0343
|
Kernel or userland processes generating high-rate network traffic (ICMP, UDP, TCP SYN) beyond expected interface throughput or user behavior norms. |
| AN0971 | macOS |
Enterprise |
DET0343
|
Excessive outbound traffic via |
| AN0972 | IaaS |
Enterprise |
DET0343
|
VM or cloud instance generating anomalously high network egress targeting same destination IP or service, especially using stateless protocols. |
| AN0973 | Windows |
Enterprise |
DET0344
|
Detects abuse of fileless storage mechanisms such as Registry keys, WMI classes, and Event Logs used to stage payloads, scripts, or encoded content outside traditional files. |
| AN0974 | Linux |
Enterprise |
DET0344
|
Detects usage of shared memory directories (/dev/shm, /run/shm) for temporary storage of obfuscated, encoded, or executable data without persistence to disk. |
| AN0975 | Windows |
Enterprise |
DET0345
|
Correlate registry modifications (e.g., UAC bypass registry keys), unusual parent-child process relationships (e.g., control.exe spawning cmd.exe), and unsigned elevated process executions with non-standard tokens or elevation flags. |
| AN0976 | Linux |
Enterprise |
DET0345
|
Monitor audit logs for setuid/setgid bit changes, executions where UID ≠ EUID (indicative of sudo or privilege escalation), and high-integrity binaries launched by unprivileged users. |
| AN0977 | macOS |
Enterprise |
DET0345
|
Detect execution of |
| AN0978 | Identity Provider |
Enterprise |
DET0345
|
Monitor for unexpected privilege elevation operations via SAML assertion manipulation, role injection, or changes to identity mappings that result in access escalation. |
| AN0979 | IaaS |
Enterprise |
DET0345
|
Detect sudden privilege escalations such as IAM role changes, user-assigned privilege boundaries, or elevation via assumed roles beyond normal behavior. |
| AN0980 | Windows |
Enterprise |
DET0346
|
Unusual use of screen capture APIs (e.g., CopyFromScreen) or command-line tools to write image files to disk. |
| AN0981 | macOS |
Enterprise |
DET0346
|
Invocation of built-in commands like screencapture or use of undocumented APIs from suspicious parent processes. |
| AN0982 | Linux |
Enterprise |
DET0346
|
Use of tools like xwd or import to generate screenshots, especially under non-GUI parent processes. |
| AN0983 | Windows |
Enterprise |
DET0347
|
Detects processes or binaries executed from trusted directories (e.g., System32) or using trusted names (e.g., svchost.exe) where the metadata, hash, or parent process does not align with legitimate activity patterns. |
| AN0984 | Linux |
Enterprise |
DET0347
|
Detects renamed binaries or scripts placed into trusted paths like /usr/bin or /lib with mismatched metadata or unexpected creation/modification times. |
| AN0985 | macOS |
Enterprise |
DET0347
|
Detects binaries or launch daemons in /System/Library or /Applications with mismatched bundle names, unexpected metadata, or improper installation origin. |
| AN0986 | Containers |
Enterprise |
DET0347
|
Detects malicious containers or pods using names, labels, or namespaces that mimic legitimate workloads; also checks for image layer mismatches and unauthorized resource deployments. |
| AN0987 | ESXi |
Enterprise |
DET0347
|
Detects VIBs, scripts, or binaries placed into directories like /bin or /etc/vmware with names mimicking standard ESXi components. Also monitors unauthorized creation of services. |
| AN0988 | Windows |
Enterprise |
DET0348
|
Identifies suspicious outbound traffic volume mismatches from processes that typically do not generate network activity, particularly over C2 protocols like HTTPS, DNS, or custom TCP/UDP ports, following file or data access. |
| AN0989 | Linux |
Enterprise |
DET0348
|
Monitors for processes reading sensitive files then immediately initiating unusual outbound connections or bulk transfer sessions over persistent sockets, particularly with encrypted or binary payloads. |
| AN0990 | macOS |
Enterprise |
DET0348
|
Detects unauthorized applications or scripts accessing sensitive data followed by establishing encrypted outbound communication to rare external destinations or with abnormal byte ratios. |
| AN0991 | ESXi |
Enterprise |
DET0348
|
Detects VMs sending outbound traffic through non-standard services or to unknown destinations. Exfiltration over reverse shells tunneled via VMkernel or custom payloads routed via hostd/vpxa. |
| AN0992 | Windows |
Enterprise |
DET0349
|
Detect suspicious file creations and process executions triggered by browser activity (e.g., injected payloads written to %AppData% or Temp directories, then executed). Correlate network anomalies with subsequent local process creation or script execution. |
| AN0993 | Linux |
Enterprise |
DET0349
|
Detect curl/wget commands saving executable/script payloads to /tmp or /var/tmp followed by execution. Monitor packet captures or IDS/IPS alerts for injected responses or mismatched content types. |
| AN0994 | macOS |
Enterprise |
DET0349
|
Monitor unified logs for processes spawned from Safari or other browsers that immediately load scripts or executables. Detect file drops in ~/Library/Caches or ~/Downloads that execute shortly after being written. |
| AN0995 | Windows |
Enterprise |
DET0350
|
Detection of processes launching downgraded PowerShell versions (e.g., v2) or other legacy binaries that lack logging or security features. Correlates command-line arguments, process metadata, and version fields. Monitors registry changes to Defender or HVCI keys that could indicate intentional downgrades. |
| AN0996 | Linux |
Enterprise |
DET0350
|
Monitors execution of older or legacy interpreters (e.g., python2, bash with restricted history logging), downgrade of TLS/SSL configurations, or forced fallback to unencrypted protocols. Detects suspicious reconfiguration of kernel modules or boot loaders to reduce integrity controls. |
| AN0997 | macOS |
Enterprise |
DET0350
|
Detection of execution of legacy scripting runtimes (e.g., older versions of Python, Bash, or PowerShell Core) lacking auditing. Monitoring for changes to EFI or system boot files indicative of downgrade-based persistence or bypass of integrity features. |
| AN0998 | Linux |
Enterprise |
DET0351
|
Linux permission escalation behavioral chain: (1) Process creation of permission modification utilities (chmod, chown, chgrp, setfacl) with suspicious parameters indicating privilege escalation intent, (2) System call analysis revealing direct file metadata manipulation (chmod, fchmod, chown, fchown syscalls), (3) Extended attribute and ACL modifications targeting critical system paths, (4) Temporal correlation with subsequent file access or process execution from modified locations, (5) Anomalous permission patterns deviating from system baselines |
| AN0999 | macOS |
Enterprise |
DET0351
|
macOS permission and attribute manipulation behavioral chain: (1) Process execution of permission utilities (chmod, chown, chgrp) or macOS-specific tools (chflags) with suspicious parameters, (2) System Integrity Protection (SIP) bypass attempts through permission modifications, (3) File flags manipulation (uchg, schg, hidden) for evasion or persistence, (4) Extended attribute (xattr) modifications affecting security metadata, (5) Unified log correlation with file system events and subsequent access patterns, (6) Gatekeeper and code signing bypass through permission/attribute manipulation |
| AN1000 | Windows |
Enterprise |
DET0352
|
Detects unauthorized Kerberos ticket injection by correlating service ticket (TGS - 4769) requests with absent corresponding account logons (4624) and prior Ticket Granting Ticket (TGT - 4768) activity. Highlights anomalous service ticket generation chains involving unexpected users, hosts, or times, and suspicious injection of tickets via mimikatz-like tooling into LSASS memory. Behavior also includes network lateral movement using Kerberos authentication absent expected interactive logon patterns. |
| AN1001 | Windows |
Enterprise |
DET0353
|
Registry modifications to HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList setting user visibility to 0, or creation of user accounts not shown on login screen. Defender view: correlation of account creation with registry edits that mark users hidden. |
| AN1002 | Linux |
Enterprise |
DET0353
|
Use of gsettings or direct Display Manager modifications to hide users from greeter login screen. Defender view: anomalous command execution modifying org.gnome.login-screen or other greeter configurations. |
| AN1003 | macOS |
Enterprise |
DET0353
|
User creation or modification via dscl with IsHidden=1, UID<500, or plist edits to com.apple.loginwindow Hide500Users flag. Defender view: correlation of hidden account attributes with login screen exclusion. |
| AN1004 | Windows |
Enterprise |
DET0354
|
Unusual or unauthorized external remote access attempts (e.g., RDP, VPN, Citrix) → repeated failed logins followed by a successful session from uncommon geolocations or outside business hours → subsequent internal lateral movement or data exfiltration activities. |
| AN1005 | Linux |
Enterprise |
DET0354
|
Repeated SSH, VPN, or RDP gateway authentication attempts from external IPs → subsequent successful logon → remote shell or lateral movement activity (e.g., scp/sftp). |
| AN1006 | macOS |
Enterprise |
DET0354
|
Unexpected inbound or outbound VNC/SSH/Screen Sharing connections from external sources → repeated failed logins followed by success → remote interactive sessions or abnormal file transfers. |
| AN1007 | Containers |
Enterprise |
DET0354
|
Connections to exposed container services (e.g., Docker API, Kubernetes API server) from unauthorized external IPs → abnormal container creation/start → lateral activity within cluster nodes. |
| AN1008 | Windows |
Enterprise |
DET0355
|
Detect abnormally high volume of inbound email messages or repetitive attachments being delivered to a single mailbox within a short time window. Defenders should look for anomalous spikes in message counts and repetitive attachment file creation events correlated with targeted users. |
| AN1009 | Linux |
Enterprise |
DET0355
|
Monitor mail server logs (e.g., Postfix, Sendmail) for excessive connections or inbound message counts targeting a single recipient. Correlate with repetitive attachment storage in /var/mail or /var/spool/mail directories. |
| AN1010 | Office Suite |
Enterprise |
DET0355
|
Detect abnormal use of email clients (e.g., Outlook, Thunderbird) showing mass arrival of messages or repetitive attachments being locally stored. Correlate message volume with file creation activity in mail cache directories. |
| AN1011 | macOS |
Enterprise |
DET0355
|
Monitor unified logs and Mail.app activity for repetitive incoming messages with attachments. Defenders should look for large volumes of incoming mail stored under ~/Library/Mail with unusual timing or repetitive subjects. |
| AN1012 | Windows |
Enterprise |
DET0356
|
Burst of incomplete TCP handshakes (e.g., SYN floods) or uncorrelated ACK packets targeting the state table resulting in OS resource exhaustion. |
| AN1013 | Linux |
Enterprise |
DET0356
|
Flood of spoofed SYN or ACK packets causing exhaustion of OS TCP state table, potentially via user-space utilities or kernel-level DoS agents. |
| AN1014 | macOS |
Enterprise |
DET0356
|
Adversary tool/script issuing mass SYN/ACK floods that degrade OS responsiveness and interrupt service response on macOS endpoints. |
| AN1015 | Windows |
Enterprise |
DET0357
|
Execution of utilities (e.g., ping, tracert, Test-NetConnection) or scripted methods to test Internet connectivity by interacting with external IPs/domains. |
| AN1016 | Linux |
Enterprise |
DET0357
|
Execution of ping, traceroute, or curl/wget against public IPs/domains to verify Internet reachability. |
| AN1017 | macOS |
Enterprise |
DET0357
|
Execution of ping, traceroute, or network utility tools to external destinations; may include |
| AN1018 | ESXi |
Enterprise |
DET0357
|
Execution of |
| AN1019 | SaaS |
Enterprise |
DET0358
|
Detection of excessive or programmatic access to Confluence spaces or pages, particularly by privileged users, through a combination of access logs, API usage, and identity context. Correlates logon sessions, user roles, and abnormal document viewing or export behavior. Identifies burst access patterns and tools/scripts abusing the Confluence API for mass enumeration or data scraping. |
| AN1020 | Windows |
Enterprise |
DET0359
|
Suspicious processes (e.g., Tor clients, relays, unknown binaries) launch with sustained encrypted outbound traffic to known anonymity infrastructure (e.g., Tor, I2P), and may relay to additional internal systems via reverse proxying, ICMP tunneling, or socket forwarding. |
| AN1021 | Linux |
Enterprise |
DET0359
|
Tools such as |
| AN1022 | macOS |
Enterprise |
DET0359
|
LaunchAgents or LaunchDaemons initiate persistent Tor or relay processes that make encrypted outbound connections. May be paired with sandbox bypasses or unsigned executables communicating over SOCKS proxies. |
| AN1023 | ESXi |
Enterprise |
DET0359
|
Outbound encrypted traffic initiated from hypervisor shell or via VM backdoor mechanisms to relays in VPS infrastructure, especially if traversing multiple nodes before reaching Internet destination. Packet captures or firewall logs show non-VM communication paths. |
| AN1024 | Network Devices |
Enterprise |
DET0359
|
Encrypted traffic or ICMP tunneling from border routers to internal routers or unknown external IPs. Forwarded traffic shows consistent hop-to-hop relaying without matching configured VPN or expected network topology. |
| AN1025 | Windows |
Enterprise |
DET0360
|
Detection of domain group enumeration through command-line utilities such as 'net group /domain' or PowerShell cmdlets, followed by suspicious access to API calls or LSASS memory. |
| AN1026 | Linux |
Enterprise |
DET0360
|
Behavioral detection of domain group enumeration via ldapsearch or custom scripts leveraging LDAP over the network. |
| AN1027 | macOS |
Enterprise |
DET0360
|
Enumeration of domain groups using dscacheutil or dscl commands, often following initial login or domain trust queries. |
| AN1028 | Windows |
Enterprise |
DET0361
|
Abuse of Regsvcs.exe or Regasm.exe to execute arbitrary code embedded in .NET assemblies via [ComRegisterFunction]/[ComUnregisterFunction]. Behavioral chain: (1) Process creation of regsvcs/regasm with suspicious assembly paths/flags → (2) Assembly/DLL load inside regsvcs/regasm → (3) Registry writes to HKCR\CLSID/ProgID during COM registration → (4) Optional child process or network activity spawned by installer/registration code. |
| AN1029 | Windows |
Enterprise |
DET0362
|
Detection of AppCert DLL abuse involves correlating registry modifications to the AppCertDLLs key with subsequent unexpected DLL load behavior during process creation events. Specifically, defenders can observe abnormal DLLs being loaded into standard Windows processes after changes to the 'AppCertDLLs' registry value. Monitoring CreateProcess-family API executions with injected DLLs and linking those DLLs back to recent registry edits is key to identifying misuse. This is often accompanied by elevated privileges and potential lateral movement or discovery behavior. |
| AN1030 | Windows |
Enterprise |
DET0363
|
A non-privileged or abnormal process attempts to open a handle with full access (0x1F0FFF) to lsass.exe and subsequently invokes memory dump, file creation, or registry modification indicative of credential scraping. This behavior chain reflects staged credential theft activity. |
| AN1031 | Windows |
Enterprise |
DET0364
|
Detects adversarial abuse of WMI to execute local or remote commands via WMIC, PowerShell, or COM API through a multi-event chain: process creation, command execution, and corresponding network connection if remote. |
| AN1032 | Windows |
Enterprise |
DET0365
|
Correlation of Registry key creation/modification events under known Run/Startup keys with new or unusual binary paths or script-based payloads. Multi-event detection includes registry modification followed by process execution from non-standard directories or abnormal parent-child process relationships. |
| AN1033 | Windows |
Enterprise |
DET0366
|
Detects adversary behavior where a file with a benign-looking first extension (e.g., .txt, .jpg) ends with a dangerous second extension (e.g., .exe, .scr), and is subsequently executed. The behavior chain includes file creation with misleading naming and user or system-initiated process execution from the disguised file. |
| AN1034 | Windows |
Enterprise |
DET0367
|
Correlates Group Policy updates that configure network logon scripts with subsequent remote file execution behaviors triggered by user logons to identify potential persistence or execution chains tied to adversarial manipulation of logon scripts. |
| AN1035 | Windows |
Enterprise |
DET0368
|
Detects tampered hardware or firmware via anomalous host status telemetry. Behavioral chain: (1) Pre-OS or firmware components exhibit unexpected version changes, signature failures, or modified boot paths; (2) System management/firmware tools log hardware inventory drift; (3) Sensor health telemetry or boot attestation events fail baseline checks; (4) Follow-on process execution from altered firmware or unknown drivers after boot. |
| AN1036 | Linux |
Enterprise |
DET0368
|
Monitors for hardware or firmware tampering by correlating system boot logs, hardware inventory changes, and secure boot/firmware verification failures. Behavioral chain: (1) UEFI/BIOS version drift; (2) secure boot disabled or signature verification errors; (3) unexpected modules or hardware devices enumerated at boot; (4) new device firmware images loaded from non-approved sources. |
| AN1037 | macOS |
Enterprise |
DET0368
|
Detects tampered Mac hardware/firmware by analyzing unified logs, EndpointSecurity events, and Apple Mobile File Integrity (AMFI) checks. Behavioral chain: (1) Boot process reports firmware signature mismatch; (2) Secure Boot policy altered; (3) new EFI drivers or hardware devices appear in inventory; (4) system extension loads from unapproved developer IDs post-boot. |
| AN1038 | Linux |
Enterprise |
DET0369
|
Correlate file modifications in shell startup scripts (e.g., .bashrc, .profile) with embedded |
| AN1039 | macOS |
Enterprise |
DET0369
|
Detect unauthorized |
| AN1040 | Windows |
Enterprise |
DET0370
|
Execution of file enumeration commands (e.g., 'dir', 'tree') from non-standard processes or unusual user contexts, followed by recursive directory traversal or access to sensitive locations. |
| AN1041 | Linux |
Enterprise |
DET0370
|
Use of file enumeration commands (e.g., 'ls', 'find', 'locate') executed by suspicious users or scripts accessing broad file hierarchies or restricted directories. |
| AN1042 | macOS |
Enterprise |
DET0370
|
Execution of file or directory discovery commands (e.g., 'ls', 'find') from terminal or script-based tooling, especially outside normal user workflows. |
| AN1043 | ESXi |
Enterprise |
DET0370
|
Execution of esxcli commands to enumerate datastore, configuration files, or directory structures by unauthorized or remote users. |
| AN1044 | Network Devices |
Enterprise |
DET0370
|
Execution of file discovery commands (e.g., 'dir', 'show flash', 'nvram:') from CLI interfaces, especially by unauthorized users or from abnormal source IPs. |
| AN1045 | Windows |
Enterprise |
DET0371
|
Monitor for suspicious use of Windows API calls such as IsDebuggerPresent() and NtQueryInformationProcess(), or processes manually checking the BeingDebugged flag in the Process Environment Block (PEB). Detect sequences of OutputDebugStringW() calls in short intervals that may indicate debugger flooding attempts. |
| AN1046 | Linux |
Enterprise |
DET0371
|
Monitor access to /proc/self/status where TracerPID field is queried, as this is a common technique for debugger detection. Detect processes that attempt to trigger exceptions intentionally and monitor whether exception handling indicates presence of a debugger. |
| AN1047 | macOS |
Enterprise |
DET0371
|
Detect suspicious calls to sysctl or ptrace API used to determine if a process is being debugged. Monitor for processes that flood OutputDebugString equivalents or generate abnormal exceptions to evade analysis. |
| AN1048 | Windows |
Enterprise |
DET0372
|
Correlated use of sleep/delay mechanisms (e.g., kernel32!Sleep, NTDLL APIs) in short-lived processes, combined with parent processes invoking suspicious scripts (e.g., wscript, powershell) with minimal user interaction. |
| AN1049 | Linux |
Enterprise |
DET0372
|
Shell scripts or binaries invoking repeated 'sleep', 'ping', or low-level syscalls (e.g., nanosleep) in short-lived execution chains with no user or system interaction. Frequently seen in malicious cron jobs or payload stagers. |
| AN1050 | macOS |
Enterprise |
DET0372
|
Execution of AppleScript, bash, or launchd jobs that invoke delay functions (e.g., sleep, delay in AppleScript) with limited parent interaction and staged follow-on commands. |
| AN1051 | Office Suite |
Enterprise |
DET0373
|
Detection of anomalous or unauthorized mailbox delegation activity (e.g., Add-MailboxPermission, Default/Anonymous mailbox permissions, Gmail delegation setup). |
| AN1052 | Windows |
Enterprise |
DET0373
|
Execution of PowerShell commands that modify mailbox permissions using Exchange cmdlets (e.g., Add-MailboxPermission), often tied to BEC or post-compromise persistence. |
| AN1053 | IaaS |
Enterprise |
DET0374
|
Correlate creation or modification of serverless functions (e.g., AWS Lambda, GCP Cloud Functions, Azure Functions) with anomalous IAM role assignments or permissions escalation events. Detect subsequent executions of newly created functions that perform unexpected actions such as spawning outbound network connections, accessing sensitive resources, or creating additional credentials. |
| AN1054 | Office Suite |
Enterprise |
DET0374
|
Monitor for creation of new Power Automate flows or equivalent automation scripts that trigger on user or file events. Detect anomalous actions performed by these automations, such as email forwarding, anonymous link creation, or unexpected API calls to external endpoints. |
| AN1055 | SaaS |
Enterprise |
DET0374
|
Track creation or update of SaaS automation scripts (e.g., Google Workspace Apps Script). Detect when these scripts are bound to user events such as file opens or account modifications, and correlate with subsequent abnormal API calls that exfiltrate or modify user data. |
| AN1056 | Linux |
Enterprise |
DET0375
|
Monitor for creation or modification of udev rules files in key directories (/etc/udev/rules.d/, /lib/udev/rules.d/, /usr/lib/udev/rules.d/). Look for RUN+= or IMPORT keys invoking suspicious binaries or scripts. Correlate this with process execution from systemd-udevd context, and file writes near udev reload/restart events. Combine this with unexpected background process spawning from udevd-related forks. |
| AN1057 | Windows |
Enterprise |
DET0376
|
Detects processes performing network enumeration (e.g., port scans, service probing) by correlating process creation, socket connections, and sequential destination IP probing within a time window. |
| AN1058 | Linux |
Enterprise |
DET0376
|
Detects use of network scanning utilities or scripts performing rapid connections to multiple services or hosts using auditd and netflow/pcap telemetry. |
| AN1059 | macOS |
Enterprise |
DET0376
|
Detects Bonjour-based mDNS enumeration or use of system tools (e.g., dns-sd, nmap) to find active services via multicast probing or targeted scans. |
| AN1060 | Containers |
Enterprise |
DET0376
|
Detects lateral discovery or container breakout attempts using netcat, curl, or custom binaries probing other services within the same namespace or VPC subnet. |
| AN1061 | Windows |
Enterprise |
DET0377
|
Unauthorized or anomalous loading of kernel-mode drivers or DLLs, concealed services, or abnormal modification of boot components indicative of rootkit activity. |
| AN1062 | Linux |
Enterprise |
DET0377
|
Abnormal loading of kernel modules, direct tampering with /dev, /proc, or LD_PRELOAD behaviors hiding processes or files. |
| AN1063 | macOS |
Enterprise |
DET0377
|
Execution of unsigned kernel extensions (KEXTs), tampering with LaunchDaemons, or userspace hooks into system libraries. |
| AN1064 | Windows |
Enterprise |
DET0378
|
Correlates script execution or suspicious parent processes with creation or modification of encoded, compressed, or encrypted file formats (e.g., .zip, .7z, .enc) and abnormal command-line syntax or PowerShell obfuscation. |
| AN1065 | Linux |
Enterprise |
DET0378
|
Detects use of gzip, base64, tar, or openssl in scripts or commands that encode/encrypt files after file staging or system enumeration. |
| AN1066 | macOS |
Enterprise |
DET0378
|
Monitors use of archive or encryption tools (zip, openssl) tied to user-scripted activity or binaries writing encoded payloads under /Users or /Volumes. |
| AN1067 | Network Devices |
Enterprise |
DET0378
|
Identifies transfer of base64, uuencoded, or high-entropy files over HTTP, FTP, or custom protocols in lateral movement or exfiltration streams. |
| AN1068 | ESXi |
Enterprise |
DET0378
|
Detects encoded PowerCLI or Base64-encoded payloads staged via datastore uploads or shell access (e.g., ESXi Shell or backdoored VIBs). |
| AN1069 | Network Devices |
Enterprise |
DET0379
|
Detects rogue Wi-Fi access points broadcasting the same SSID as legitimate APs with stronger signal strength, unexpected MAC/BSSID values, or inconsistent encryption settings. Correlates authentication attempts, captive portal redirections, and anomalous traffic flows through unauthorized APs. |
| AN1070 | Windows |
Enterprise |
DET0380
|
Adversaries collecting local files via PowerShell, WMI, or direct file API calls often include recursive file listings, targeted file reads, and temporary file staging. |
| AN1071 | Linux |
Enterprise |
DET0380
|
Adversaries using bash scripts or tools to recursively enumerate user home directories, config files, or SSH keys. |
| AN1072 | macOS |
Enterprise |
DET0380
|
Adversary use of bash/zsh or AppleScript to locate files and exfil targets like user keychains or documents. |
| AN1073 | Network Devices |
Enterprise |
DET0380
|
Collection of device configuration via CLI commands (e.g., |
| AN1074 | ESXi |
Enterprise |
DET0380
|
Adversaries accessing datastore or configuration files via |
| AN1075 | Windows |
Enterprise |
DET0381
|
Correlates file enumeration of XML files in the SYSVOL share with suspicious process execution that decodes or reads encrypted credentials embedded in Group Policy Preference files (e.g., Get-GPPPassword.ps1, gpprefdecrypt.py, Metasploit). Detects abnormal access to \DOMAIN\SYSVOL combined with XML file parsing or decryption logic. |
| AN1076 | Windows |
Enterprise |
DET0382
|
Detects adversary use of suspended process creation, using the CREATE_SUSPENDED flag via CreateProcess, followed by unmapping the memory of the child process (NtUnmapViewOfSection) and replacing it with malicious code via VirtualAllocEx/WriteProcessMemory, then SetThreadContext and ResumeThread to begin execution within the hollowed process. |
| AN1077 | Windows |
Enterprise |
DET0383
|
Detects adversary behavior where a newly created or renamed user account closely resembles existing service or administrator accounts to blend in and avoid detection. Common patterns include prefix/suffix modifications, homoglyphs, or use of names like 'admin1', 'adm1n', or 'backup_help'. |
| AN1078 | Linux |
Enterprise |
DET0383
|
Detects creation or renaming of accounts with names that closely match known service, root, or admin accounts. Behavior often follows account discovery or deletion, attempting to blend into system activity logs using trusted name conventions. |
| AN1079 | Identity Provider |
Enterprise |
DET0383
|
Detects adversary creation of cloud or IdP accounts whose names resemble existing privileged or service accounts. May indicate preparation for privilege escalation or defense evasion. |
| AN1080 | Containers |
Enterprise |
DET0383
|
Monitors for the creation of accounts inside containers using names that resemble legitimate orchestrator or backup identities to mask adversary persistence. |
| AN1081 | Linux |
Enterprise |
DET0384
|
Detects bash, sh, zsh, or BusyBox shell execution initiated via remote sessions, unauthorized users, or embedded within secondary script interpreters. Focus is on chained behavior: shell > suspicious commands > network discovery or persistence indicators. |
| AN1082 | macOS |
Enterprise |
DET0384
|
Identifies use of sh/bash/zsh in suspicious context, such as user scripts launched from non-standard apps (e.g., Preview.app), embedded in LaunchDaemons, or executed outside Terminal.app. Looks for misuse in Automator, LaunchAgents, or NSAppleScript-executed shell. |
| AN1083 | ESXi |
Enterprise |
DET0384
|
Detects BusyBox or Ash shell execution from unauthorized logins or remote connections. Focus is on rare shell invocations from DCUI, SSH sessions, or remote management paths. Also watches for payload droppers or persistence artifacts using shell. |
| AN1084 | Network Devices |
Enterprise |
DET0384
|
Detects Unix shell usage on network appliances (e.g., routers, firewalls, embedded Linux) through rare console commands, CLI interfaces, or script injection via exposed APIs or SSH. |
| AN1085 | Linux |
Enterprise |
DET0385
|
A process outside of interactive shell context reads ~/.bash_history directly (e.g., using cat, less, grep), often shortly after privilege escalation or user switch (su/sudo). This may be followed by credential scanning in memory or file writes to new locations. |
| AN1086 | macOS |
Enterprise |
DET0385
|
A process or terminal command outside of standard shell utilities reads the user's .bash_history file. On macOS, unified logs or telemetry tools like EndpointSecurity (ESF) may observe file read APIs or terminal process lineage that shows non-user-initiated access. |
| AN1087 | Identity Provider |
Enterprise |
DET0386
|
Enumeration of identity roles and users via API calls such as |
| AN1088 | IaaS |
Enterprise |
DET0386
|
Use of AWS CLI ( |
| AN1089 | Office Suite |
Enterprise |
DET0386
|
Bulk enumeration of cloud user email identities through |
| AN1090 | SaaS |
Enterprise |
DET0386
|
Access to organizational directories via Google Workspace Directory API, Slack SCIM, or Okta SCIM by apps or identities outside normal roles. |
| AN1091 | Windows |
Enterprise |
DET0387
|
Detects anomalous ARP traffic or cache modifications on Windows endpoints that indicate ARP poisoning. Behavioral focus is on multiple IP addresses resolving to a single MAC, or unsolicited ARP replies from unauthorized devices. |
| AN1092 | Linux |
Enterprise |
DET0387
|
Detects suspicious gratuitous ARP responses or inconsistent IP-to-MAC mappings using auditd and packet capture. Behavioral focus is on unsolicited replies overriding legitimate ARP ownership. |
| AN1093 | macOS |
Enterprise |
DET0387
|
Detects anomalous ARP cache changes and unsolicited ARP broadcasts using unified logs and packet capture. Behavioral detection includes multiple IP addresses mapped to the same MAC address and repeated gratuitous ARP traffic. |
| AN1094 | Windows |
Enterprise |
DET0388
|
Detects a multi-event behavior chain involving UAC bypass attempts via known auto-elevated binaries (e.g., eventvwr.exe, sdclt.exe), unauthorized Registry changes to UAC-related keys, and anomalous process execution with elevated privileges but lacking standard parent-child lineage. Suspicious patterns include invocation of auto-elevated COM objects or manipulation of isolatedCommand Registry entries without consent prompts. |
| AN1095 | Windows |
Enterprise |
DET0389
|
Detects DLL injection through correlation of memory allocation and writing to remote process memory (e.g., VirtualAllocEx, WriteProcessMemory), followed by remote thread creation (e.g., CreateRemoteThread) that loads a suspicious or unsigned DLL using LoadLibrary or reflective loading. |
| AN1096 | Linux |
Enterprise |
DET0390
|
Correlation of file creation/modification of |
| AN1097 | Windows |
Enterprise |
DET0391
|
Monitor for runtime data manipulations by detecting suspicious modification of application binaries, API hooking, or unexpected behavior from processes responsible for rendering or displaying data. Correlate registry edits, process creation, and unexpected binary hash mismatches. |
| AN1098 | Linux |
Enterprise |
DET0391
|
Detect runtime manipulation by monitoring system calls for modifications to shared libraries, ELF binaries, or environment variables that affect how data is displayed. Look for suspicious writes to application directories and mismatch in binary integrity baselines. |
| AN1099 | macOS |
Enterprise |
DET0391
|
Monitor for runtime manipulation by observing changes in application bundles, unexpected signing modifications, and runtime API calls that inject or alter how data is displayed. Detect alterations in CFNetwork or CoreFoundation frameworks responsible for rendering data. |
| AN1100 | Windows |
Enterprise |
DET0392
|
Adversary spawns a process or script to enumerate installed software using WMI, registry, or PowerShell, potentially followed by additional discovery or evasion behavior. |
| AN1101 | Linux |
Enterprise |
DET0392
|
Adversary invokes 'dpkg -l', 'rpm -qa', or other package managers via shell or script to enumerate installed software. |
| AN1102 | macOS |
Enterprise |
DET0392
|
Adversary runs 'system_profiler SPApplicationsDataType' or queries plist files to enumerate software via Terminal or scripts. |
| AN1103 | IaaS |
Enterprise |
DET0392
|
Adversary uses cloud-native APIs or CLI (e.g., AWS Systems Manager, Azure Resource Graph) to list installed software on cloud workloads. |
| AN1104 | ESXi |
Enterprise |
DET0392
|
Adversary uses 'esxcli software vib list' to enumerate installed VIBs, drivers, and modules. |
| AN1105 | IaaS |
Enterprise |
DET0393
|
Multiple AWS CloudTrail events indicating temporary privilege escalation via PassRole and AssumeRole targeting newly created services or non-interactive infrastructure. |
| AN1106 | Identity Provider |
Enterprise |
DET0393
|
Token creation or access delegation where a user impersonates a higher-privileged service account or performs domain-wide delegation actions, such as GCP's serviceAccountTokenCreator or Workspace impersonation. |
| AN1107 | Office Suite |
Enterprise |
DET0393
|
Detection of ApplicationImpersonation role assignment or delegated mailbox access to service principals or rarely used users, especially outside of normal hours or geographic norms. |
| AN1108 | Windows |
Enterprise |
DET0394
|
Unexpected file creation in web directories followed by web server processes (e.g., w3wp.exe) spawning command shells or script interpreters (e.g., cmd.exe, powershell.exe) |
| AN1109 | Linux |
Enterprise |
DET0394
|
File creation of unauthorized script (e.g., .php, .sh) in /var/www/html followed by execution of unexpected system utilities (e.g., curl, bash, nc) by apache/nginx |
| AN1110 | macOS |
Enterprise |
DET0394
|
Web servers (e.g., httpd) spawning abnormal processes post file upload into /Library/WebServer/Documents or /usr/local/var/www |
| AN1111 | macOS |
Enterprise |
DET0395
|
Detects abuse of AuthorizationExecuteWithPrivileges API to gain elevated privileges via user credential prompts, typically through invocation of /usr/libexec/security_authtrampoline. Detection involves correlation of API usage, binary reputation, and prompt context. |
| AN1112 | macOS |
Enterprise |
DET0396
|
Detects suspicious access to macOS Keychain files and APIs. Observes processes invoking the 'security' utility or accessing Keychain databases directly, correlates these with abnormal parent process lineage or unexpected user context. Monitors attempts to dump, unlock, or read credential storage beyond normal application workflows. |
| AN1113 | Windows |
Enterprise |
DET0397
|
Detection of automated tools or scripts periodically transmitting data to external destinations using scheduled tasks or background processes. |
| AN1114 | Linux |
Enterprise |
DET0397
|
Background scripts (e.g., via cron) or daemons transmitting data repeatedly to remote IPs or URLs. |
| AN1115 | macOS |
Enterprise |
DET0397
|
Observation of LaunchAgents or LaunchDaemons establishing periodic external connections indicative of automated data transfer. |
| AN1116 | Windows |
Enterprise |
DET0398
|
Office-based persistence via Office template macros, Outlook forms/rules/homepage, or registry-persistent scripts. Adversary modifies registry keys or Office application directories to load malicious scripts at startup. |
| AN1117 | Office Suite |
Enterprise |
DET0398
|
Startup-based persistence mechanisms within Microsoft Office Suite like template macros and home page redirects being configured through internal automation or client-side settings. |
| AN1118 | Windows |
Enterprise |
DET0399
|
Recurring network exfiltration initiated by scheduled or script-based processes exhibiting time-based regularity and consistent external destinations. |
| AN1119 | Linux |
Enterprise |
DET0399
|
Detection of cron-based or script-based recurring transfers where the same script, user, or destination reappears at predictable intervals. |
| AN1120 | macOS |
Enterprise |
DET0399
|
LaunchAgent or launchd recurring jobs initiating data transfer to consistent external IPs or domains with repeat timing signatures. |
| AN1121 | Windows |
Enterprise |
DET0400
|
Detects high-frequency or anomalous DNS queries initiated by non-browser, non-system processes (e.g., PowerShell, rundll32, python.exe) used to establish command and control via DNS tunneling. |
| AN1122 | Linux |
Enterprise |
DET0400
|
Detects local daemons or scripts generating outbound DNS queries with long or frequent subdomains, indicative of DNS tunneling via tools like |
| AN1123 | macOS |
Enterprise |
DET0400
|
Detects scripting environments (AppleScript, osascript, curl) or non-native tools performing DNS queries with encoded subdomains, often used for data exfiltration or beaconing. |
| AN1124 | Network Devices |
Enterprise |
DET0400
|
Detects clients issuing DNS queries with high volume, long subdomain lengths, encoded payload patterns, or to known malicious infrastructure; indicative of DNS-based C2 channels. |
| AN1125 | ESXi |
Enterprise |
DET0400
|
Detects unusual outbound DNS traffic from ESXi hosts, often from shell scripts, custom daemons, or malicious VIBs interacting with external DNS infrastructure outside the management plane. |
| AN1126 | macOS |
Enterprise |
DET0401
|
Creation or modification of |
| AN1127 | IaaS |
Enterprise |
DET0402
|
Unusual enumeration of services and resources through cloud APIs such as AWS CLI |
| AN1128 | Identity Provider |
Enterprise |
DET0402
|
Enumeration of directories, applications, or service principals through APIs such as Microsoft Graph or Okta API. Defender perspective includes unexpected listing of users, roles, applications, and abnormal access to identity management endpoints. |
| AN1129 | Office Suite |
Enterprise |
DET0402
|
Discovery of SaaS services connected to productivity platforms (e.g., Microsoft 365, Google Workspace). Defender perspective includes unexpected enumeration of enabled services, API integrations, or OAuth applications tied to user accounts. |
| AN1130 | SaaS |
Enterprise |
DET0402
|
Discovery of connected SaaS applications, APIs, or configurations within platforms like Salesforce, Slack, or Zoom. Defender perspective includes enumeration of available integrations, abnormal querying of service metadata, and follow-on attempts to exploit or persist via discovered services. |
| AN1131 | IaaS |
Enterprise |
DET0403
|
Configuration changes to virtual TAP/mirror policies that forward traffic to unapproved destinations. Detection correlates management plane API calls with mirrored traffic observation. |
| AN1132 | Network Devices |
Enterprise |
DET0403
|
Unauthorized mirroring sessions initiated on routers/switches (e.g., via |
| AN1133 | Windows |
Enterprise |
DET0404
|
Monitor Windows Registry modifications to Winlogon keys (Shell, Userinit, Notify) that introduce new executable or DLL paths. Correlate these changes with subsequent DLL loading, image loads, or process creation originating from winlogon.exe or userinit.exe. Abnormal child process lineage or unauthorized binaries in C:\Windows\System32 may indicate abuse. |
| AN1134 | Windows |
Enterprise |
DET0405
|
Correlates LNK file execution with embedded resource extraction or suspicious network activity following initial launch, often leading to payload delivery via disguised icons. |
| AN1135 | Linux |
Enterprise |
DET0406
|
Abuse of extended attributes (xattrs) to embed hidden payloads into legitimate files. Defender perspective: detect anomalous use of setfattr or getfattr commands, or direct syscalls (setxattr, getxattr) where attributes are unusually large or contain encoded data. Behavior chain includes: (1) execution of setfattr with suspicious namespaces (user., trusted.), (2) file metadata modification inconsistent with file size/hash, and (3) subsequent process execution reading attributes followed by decoding activity. |
| AN1136 | macOS |
Enterprise |
DET0406
|
Abuse of extended attributes (xattrs) to hide payloads in com.apple. or custom keys. Defender perspective: monitor suspicious use of xattr command with -w (write) and -p (print) flags, especially when followed by execution of interpreters like bash, Python, or osascript. Behavior chain includes: (1) suspicious file modification with new com.apple. attributes, (2) attribute content inconsistent with expected metadata tags (e.g., high entropy), (3) subsequent process execution correlated with extraction of the attribute. |
| AN1137 | Windows |
Enterprise |
DET0407
|
Detects anomalous usage of local accounts to log into a system, especially accounts not typically used interactively or outside business hours. |
| AN1138 | Linux |
Enterprise |
DET0407
|
Detects interactive or service logins from local accounts outside expected operational context or at anomalous times. |
| AN1139 | macOS |
Enterprise |
DET0407
|
Detects abnormal or rare logins via local accounts through system or remote mechanisms such as SSH. |
| AN1140 | Windows |
Enterprise |
DET0408
|
Outbound spoofed traffic to known amplification protocols (e.g., DNS, NTP, Memcached) combined with abnormal network traffic volume targeting remote reflectors, resulting in disproportionate traffic returned to a victim |
| AN1141 | Linux |
Enterprise |
DET0408
|
Spoofed outbound packets sent to amplification services from command-line tools or scripts, combined with abnormal outbound packet volume on known reflector ports |
| AN1142 | macOS |
Enterprise |
DET0408
|
Command-line initiated UDP traffic bursts to external reflection amplification ports using built-in scripting or binaries with network anomalies |
| AN1143 | IaaS |
Enterprise |
DET0408
|
Cloud-hosted VM or container generates spoofed UDP requests to third-party services on known amplifier ports, with high outbound-to-inbound traffic ratios in VPC Flow Logs |
| AN1144 | Windows |
Enterprise |
DET0409
|
Detects anomalous NTLM LogonType 3 authentications that occur without accompanying domain logon events, especially from lateral systems or involving built-in administrative tools. Monitors for mismatches between source user context and system being accessed. Correlates LogonSession creation, NTLM authentications, and process/service initiation to identify suspicious use of stolen password hashes for remote access or service logon without password entry. Detects overpass-the-hash by combining Kerberos ticket issuance with NTLM-based lateral movement. |
| AN1145 | Windows |
Enterprise |
DET0410
|
Monitoring of file access to network shares (e.g., C$, Admin$) followed by unusual read or copy operations by processes not typically associated with such activity (e.g., PowerShell, certutil). |
| AN1146 | Linux |
Enterprise |
DET0410
|
Unusual access or copying of files from mounted network drives (e.g., NFS, CIFS/SMB) by user shells or scripts followed by large data transfer. |
| AN1147 | macOS |
Enterprise |
DET0410
|
Detection of file access from mounted SMB shares followed by copy or exfil commands from Terminal or script interpreter processes. |
| AN1148 | Windows |
Enterprise |
DET0411
|
Monitor DNS queries, proxy logs, and user-agent strings for anomalous patterns associated with adversary attempts to hide infrastructure. Defenders may observe DNS resolutions to short-lived domains, abnormal WHOIS registration data, or filtering of known defensive/responder IP addresses. |
| AN1149 | Linux |
Enterprise |
DET0411
|
Detect adversaries filtering traffic or modifying server responses to evade scanning. Monitor iptables, nftables, or proxy configurations that deny or redirect requests from known scanning agents or defensive tools. |
| AN1150 | macOS |
Enterprise |
DET0411
|
Monitor unified logs for manipulation of proxy configurations, DNS resolution, or filtering rules. Adversaries may redirect responses or use trusted domains that later resolve to malicious C2 infrastructure. |
| AN1151 | Network Devices |
Enterprise |
DET0411
|
Inspect network telemetry for adversary attempts to blend malicious traffic with legitimate flows using VPNs, proxies, or geolocation spoofing. Defensive teams may observe anomalous tunnels, encrypted sessions to suspicious domains, or geo-mismatched IP activity. |
| AN1152 | ESXi |
Enterprise |
DET0411
|
Monitor VM-level DNS and network traffic logs for adversary-controlled domains or selective response behavior (e.g., dropped requests from security scanners). |
| AN1153 | Windows |
Enterprise |
DET0412
|
Unusual access to bash history, registry credentials paths, or private key files by unauthorized or scripting tools, with correlated file and process activity. |
| AN1154 | Linux |
Enterprise |
DET0412
|
Reading of sensitive files like .bash_history, /etc/shadow, or private key directories by unauthorized users or unusual processes. |
| AN1155 | macOS |
Enterprise |
DET0412
|
Unusual access to ~/Library/Keychains, ~/.bash_history, or Terminal command history by unauthorized processes or users. |
| AN1156 | SaaS |
Enterprise |
DET0412
|
Unusual web-based access or API scraping of password managers, single sign-on sessions, or credential sync services via browser automation or anomalous API tokens. |
| AN1157 | Identity Provider |
Enterprise |
DET0412
|
Unauthorized API or console calls to retrieve or reset password credentials, download key material, or modify SSO settings. |
| AN1158 | Containers |
Enterprise |
DET0412
|
Access to container image layers or mounted secrets (e.g., Docker secrets) by processes not tied to entrypoint or orchestration context. |
| AN1159 | Network Devices |
Enterprise |
DET0412
|
Use of configuration backup utilities or CLI access to dump plaintext passwords, local user hashes, or SNMP strings. |
| AN1160 | Windows |
Enterprise |
DET0413
|
Programmatic or excessive access to file shares, SharePoint, or database repositories by users not typically interacting with them. This includes abnormal access by privileged accounts, enumeration of large numbers of files, or downloads of sensitive content in bursts. |
| AN1161 | Linux |
Enterprise |
DET0413
|
Command-line tools (e.g., curl, rsync, wget, or custom Python scripts) used to scrape documentation systems or internal REST APIs. Unusual access patterns to knowledge base folders or shared team drives. |
| AN1162 | SaaS |
Enterprise |
DET0413
|
Abuse of SaaS platforms such as Confluence, GitHub, SharePoint Online, or Slack to access excessive internal documentation or export source code/data. Includes use of tokens or browser automation from unapproved IPs. |
| AN1163 | macOS |
Enterprise |
DET0413
|
Access of mounted cloud shares or document repositories via browser, terminal, or Finder by users not typically interacting with those resources. Includes script-based enumeration or mass download. |
| AN1164 | macOS |
Enterprise |
DET0414
|
Detects AppleScript execution via 'osascript', NSAppleScript/OSAScript APIs, and abnormal application control events across user sessions. Focuses on causal chains such as osascript spawning child processes, script-induced keystrokes, or API-backed dialog spoofing. |
| AN1165 | Windows |
Enterprise |
DET0415
|
Repeated invocation of high-resource application endpoints or GUI components causing CPU and memory spikes, logged as elevated request volumes, prolonged handle locks, or frequent crash recoveries. |
| AN1166 | Linux |
Enterprise |
DET0415
|
Automated scripts or repeated CLI/API requests that trigger application backends to consume high CPU or memory (e.g., Apache/PHP, MySQL, mail servers), resulting in syslog errors and excessive process spawning. |
| AN1167 | macOS |
Enterprise |
DET0415
|
Repetitive triggering of GUI or backend application workflows that cause increased CPU/memory usage, logged in unified logs as spin reports or crash dumps. |
| AN1168 | IaaS |
Enterprise |
DET0415
|
Automated abuse of cloud-hosted applications (e.g., web apps, REST endpoints, internal APIs) causing compute exhaustion, high 5xx error rates, or frequent autoscaling triggers logged in app insights or cloudwatch. |
| AN1169 | Windows |
Enterprise |
DET0416
|
Detects FTP, SMB, or TFTP traffic initiated by suspicious processes like PowerShell, cmd.exe, or rundll32.exe—especially with large outbound file transfers or unbalanced traffic volume. |
| AN1170 | Linux |
Enterprise |
DET0416
|
Detects usage of FTP, SCP, or TFTP by non-interactive shells or automation scripts transferring large data volumes to untrusted IPs. |
| AN1171 | macOS |
Enterprise |
DET0416
|
Detects Automator, AppleScript, or Terminal executing curl, lftp, or TFTP for binary transfer to untrusted IPs or unusual ports. |
| AN1172 | ESXi |
Enterprise |
DET0416
|
Detects file movement or outbound TFTP/FTP transfers from ESXi host initiated via shell commands or injected scripts, particularly from scratch partitions or /tmp. |
| AN1173 | Network Devices |
Enterprise |
DET0416
|
Detects internal hosts generating large outbound FTP/TFTP/SMB sessions to external IPs, or file transfers using non-standard ports and application mismatches (e.g., FTP over port 80). |
| AN1174 | Windows |
Enterprise |
DET0417
|
Monitor command execution of powercfg.exe with arguments modifying sleep, hibernate, or display timeouts. Abnormal or repeated modifications to power settings outside administrative baselines may indicate persistence attempts. Correlate process creation with registry and system configuration changes to build behavioral chains. |
| AN1175 | Linux |
Enterprise |
DET0417
|
Detect execution of system utilities (systemctl, systemd-inhibit, systemdsleep) modifying sleep or hibernate behavior. Abnormal edits to system configuration files (e.g., /etc/systemd/sleep.conf) should be correlated with process execution to identify persistence techniques. |
| AN1176 | macOS |
Enterprise |
DET0417
|
Monitor pmset command executions altering sleep/hibernate/standby parameters. Unexpected modifications to /Library/Preferences/SystemConfiguration/com.apple.PowerManagement.plist or similar files should be correlated with process activity. |
| AN1177 | Windows |
Enterprise |
DET0418
|
Multi-stage Windows DACL manipulation behavioral chain: (1) Process creation of permission-modifying utilities (icacls.exe, takeown.exe, attrib.exe, cacls.exe) or PowerShell ACL cmdlets, (2) Command-line analysis revealing privilege escalation intent through suspicious parameters (/grant, /takeown, /T, Set-Acl), (3) DACL modification events (4670) correlating with process execution, (4) Subsequent file access attempts (4663) indicating successful permission bypass, (5) Potential follow-on persistence or lateral movement activities |
| AN1178 | Windows |
Enterprise |
DET0419
|
Correlate DNS queries that generate domains with high entropy or gibberish patterns, combined with short-lived connections from unusual processes. Monitor Sysmon DNS events and Windows Security logs for abnormal query rates and failed lookups. |
| AN1179 | Linux |
Enterprise |
DET0419
|
Identify processes issuing repeated DNS queries to random-looking domains with abnormal entropy or word concatenations. Correlate resolver logs with high NXDOMAIN rates and auditd socket connections. |
| AN1180 | macOS |
Enterprise |
DET0419
|
Monitor unified DNS logs for abnormal domain queries with low lexical similarity to known domains, repeated failed lookups, and random string structures. Cross-check with process logs to confirm unusual origins (non-browser apps). |
| AN1181 | ESXi |
Enterprise |
DET0419
|
Use ESXi syslogs to track abnormal DNS query patterns from management agents or VMs. Identify high-frequency, low-TTL, or unresolvable domains as suspicious. Correlate with unusual management plane process activity. |
| AN1182 | Windows |
Enterprise |
DET0420
|
Process execution that probes user activity artifacts (e.g., desktop files, registry history) following recent user login/unlock events. |
| AN1183 | Linux |
Enterprise |
DET0420
|
Access to shell history or GUI input state (xdotool, xinput) for presence validation prior to payload execution. |
| AN1184 | macOS |
Enterprise |
DET0420
|
API usage or filesystem access revealing user state or browser artifacts (e.g., Safari bookmarks, CGEventState). |
| AN1185 | Windows |
Enterprise |
DET0421
|
Detection focuses on abnormal service executions initiated via service control manager APIs, sc.exe, net.exe, or PsExec creating temporary services. Defenders observe process creation of services.exe spawning non-standard binaries, registry changes in service keys followed by rapid execution, and network connections originating from processes tied to transient services. Correlation across process lineage, registry activity, and service logs provides strong signals of malicious service execution. |
| AN1186 | Windows |
Enterprise |
DET0422
|
Registry key modifications under IFEO paths (e.g., Debugger value set under Image File Execution Options), especially for security-related or accessibility binaries, followed by anomalous process execution with debugger flags or SYSTEM-level access at login. Detectable by correlating registry modifications, process creation, and parent-child anomalies with unusual command-line usage or access tokens. |
| AN1187 | IaaS |
Enterprise |
DET0423
|
Detection focuses on correlating snapshot creation events with subsequent instance creation and mounting activities. From a defender perspective, suspicious sequences include snapshot creation by unexpected or newly created IAM users, snapshots created from sensitive volumes without preceding change-control activity, or snapshots immediately followed by mounting to unauthorized instances. Cross-referencing with user behavior, IP geolocation, and automation context helps distinguish benign backup operations from adversary-driven snapshot exploitation. |
| AN1188 | IaaS |
Enterprise |
DET0424
|
Creation, deletion, or modification of security groups and firewall rules in cloud control plane logs that expand access to cloud resources beyond expected baselines. Defender view: unexpected ingress/egress rules permitting 0.0.0.0/0 or opening atypical ports, often correlated with privileged role or API key activity. |
| AN1189 | Windows |
Enterprise |
DET0425
|
Detects unusual outbound connections to web services from uncommon processes using SSL/TLS, particularly those exhibiting high outbound data volume or persistence. |
| AN1190 | Linux |
Enterprise |
DET0425
|
Detects command-line tools, agents, or scripts making outbound HTTPS connections to popular web services like Discord, Slack, Dropbox, or Graph API in an unusual context. |
| AN1191 | macOS |
Enterprise |
DET0425
|
Detects user agents or background services making unauthorized or unscheduled web API calls to cloud/web services over HTTPS. |
| AN1192 | ESXi |
Enterprise |
DET0425
|
Detects guest VMs or management agents issuing HTTP(S) traffic to external services without a valid patch management or backup justification. |
| AN1193 | Windows |
Enterprise |
DET0426
|
Processes accessing raw logical drives (e.g., .\C:) to bypass file system protections or directly manipulate data structures. |
| AN1194 | Network Devices |
Enterprise |
DET0426
|
CLI or automated utilities accessing raw device volumes or flash storage directly (e.g., via |
| AN1195 | Windows |
Enterprise |
DET0427
|
Unauthorized modification of service-related registry keys such as ImagePath, FailureCommand, ServiceDll, or Performance/Parameters keys. Defender correlates registry modifications, anomalous service metadata changes, and subsequent service process executions that deviate from baseline configurations. |
| AN1196 | Linux |
Enterprise |
DET0428
|
Abuse of bind mounts to obscure process directories. Defender perspective: detecting anomalous mount operations where a process’s /proc entry is remapped to another directory, often hiding malicious activity from native utilities (ps, top). Behavior chain includes: (1) execution of |
| AN1197 | macOS |
Enterprise |
DET0429
|
Detects the modification or addition of Launch Agents or Startup Items to establish persistence. Adversaries may write plist or executable files to ~/Library/LaunchAgents/, /Library/StartupItems/, or similar directories and configure them to run at user or system boot. Detection requires correlating file creation or modification events with subsequent user logon or boot-time process execution. |
| AN1198 | Windows |
Enterprise |
DET0430
|
Monitors suspicious access to password stores such as LSASS, DPAPI, Windows Credential Manager, or browser credential databases. Detects anomalous process-to-process access (e.g., Mimikatz accessing LSASS) and correlation of credential store file reads with execution of non-standard processes. |
| AN1199 | Linux |
Enterprise |
DET0430
|
Detects access to known password store files (e.g., /etc/shadow, GNOME Keyring, KWallet, browser credential databases). Monitors anomalous process read attempts and suspicious API calls that attempt to extract stored credentials. |
| AN1200 | macOS |
Enterprise |
DET0430
|
Monitors Keychain database access and suspicious invocations of security and osascript utilities. Correlates process execution with attempts to dump or unlock Keychain data. |
| AN1201 | IaaS |
Enterprise |
DET0430
|
Detects attempts to access or enumerate cloud password/secrets storage services such as AWS Secrets Manager, Azure Key Vault, or GCP Secret Manager. Monitors API calls for abnormal enumeration or bulk retrieval of secrets. |
| AN1202 | Windows |
Enterprise |
DET0431
|
Monitor email message traces and headers for failed SPF, DKIM, or DMARC checks indicating spoofed sender identities. Correlate abnormal sender domains or mismatched return-paths with elevated spoofing likelihood. |
| AN1203 | Linux |
Enterprise |
DET0431
|
Detects spoofed emails by analyzing mail server logs (e.g., Postfix, Sendmail) for mismatched header fields, failed SPF/DKIM checks, and anomalies in SMTP proxy logs. Defender observes discrepancies between sending domain, return-path domain, and message metadata. |
| AN1204 | macOS |
Enterprise |
DET0431
|
Detects suspicious inbound mail traffic where SPF/DKIM/DMARC authentication fails or where sender and return-path domains mismatch, observable in Apple Mail unified logs or MDM-controlled logging pipelines. |
| AN1205 | Office Suite |
Enterprise |
DET0431
|
Correlates Office 365 or Google Workspace audit logs for spoofed sender addresses, failed email authentication, and anomalies in message delivery metadata. Defender observes failed SPF/DKIM checks and domain mismatches tied to suspicious campaigns. |
| AN1206 | Windows |
Enterprise |
DET0432
|
Suspicious use of NTFS file attributes such as Alternate Data Streams (ADS) or Extended Attributes (EA) to hide data. Defender perspective: anomalous file creations or modifications containing colon syntax (file.ext:ads), API calls like ZwSetEaFile/ZwQueryEaFile, or PowerShell/Windows utilities interacting with -stream parameters. Correlation across file metadata anomalies, process lineage, and command execution provides context. |
| AN1207 | Windows |
Enterprise |
DET0433
|
Abuse of mavinject.exe to inject DLLs or import descriptors into another running process. Chain: (1) mavinject.exe starts with /INJECTRUNNING or /HMODULE → (2) mavinject obtains high-access handles to a target process (VM_WRITE/CREATE_THREAD) → (3) target process loads attacker DLL (module load) → (4) optional follow-on child activity or network egress from the target process. |
| AN1208 | macOS |
Enterprise |
DET0434
|
Detects creation or modification of user-level Launch Agents in monitored directories using |
| AN1209 | Linux |
Enterprise |
DET0435
|
Detection focuses on identifying abuse of LD_PRELOAD and related linker variables. Defender perspective: monitor unexpected setting or modification of LD_PRELOAD in shell initialization scripts or environment exports, file creation of suspicious shared libraries, and correlation of these modifications with anomalous process execution. Key signals include execve events with LD_PRELOAD defined, newly created .so files in user directories, and processes hooking libc functions exhibiting abnormal behavior. |
| AN1210 | macOS |
Enterprise |
DET0435
|
Detection centers on DYLD_INSERT_LIBRARIES and DYLD_LIBRARY_PATH abuse. Defender perspective: monitor for modification of these environment variables in shell or plist files, file creation of dylibs in user-controlled paths, and correlation of environment variable usage with unexpected module loads by user applications. Suspicious indicators include processes with DYLD_INSERT_LIBRARIES set, execution of applications loading untrusted dylibs, and anomalies in module load history. |
| AN1211 | Windows |
Enterprise |
DET0436
|
Modification or replacement of service executables due to weak file or directory permissions. Defender observes file writes to service binary paths, unexpected modifications of executables associated with registered services, and subsequent service execution of attacker-supplied binaries under elevated permissions. |
| AN1212 | Windows |
Enterprise |
DET0437
|
Detects adversary activity aimed at accessing LSA Secrets, including registry key export of HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets or memory scraping via tools such as Mimikatz or PowerSploit's Invoke-Mimikatz. |
| AN1213 | Windows |
Enterprise |
DET0438
|
Detects suspicious custom compression/encryption routines through anomalous script or binary execution that produces high-entropy files without standard archiving utilities. Correlates script execution, memory API usage (bitwise ops, CryptoAPI calls), and creation of archive-like files with uncommon headers. |
| AN1214 | Linux |
Enterprise |
DET0438
|
Detects custom archive routines by correlating script execution (Python, Perl, Bash) with creation of high-entropy files in temporary or user directories. Flags processes performing unusual bitwise operations or writing files without standard compression headers. |
| AN1215 | macOS |
Enterprise |
DET0438
|
Detects custom archiving by monitoring execution of Swift/Objective-C apps or scripts producing high-entropy files with non-standard headers. Correlates unified logs of abnormal NSFileHandle/NSData operations, memory use of XOR/bitwise operations, and file creation events. |
| AN1216 | Windows |
Enterprise |
DET0439
|
Detects the relocation of malicious executables via copy/move actions across suspicious folders (e.g., from Downloads to System32), followed by deletion of the original source or renaming to blend into legitimate binaries. |
| AN1217 | Linux |
Enterprise |
DET0439
|
Detects binary movement or copying between untrusted and trusted paths (e.g., /tmp/ → /usr/bin/ or /etc/init.d/) that may indicate persistence attempts or cleanup of origin traces. |
| AN1218 | macOS |
Enterprise |
DET0439
|
Detects movement of binaries to |
| AN1219 | Network Devices |
Enterprise |
DET0439
|
Detects firmware or script relocation attempts (e.g., CLI-based |
| AN1220 | Windows |
Enterprise |
DET0440
|
Execution of SyncAppvPublishingServer.vbs through wscript.exe with a command-line containing embedded PowerShell, proxying malicious PowerShell execution through a Microsoft-signed VBScript interpreter to evade detection and restrictions. |
| AN1221 | Windows |
Enterprise |
DET0441
|
Detects the creation, modification, or deletion of scheduled tasks through Task Scheduler, WMI, PowerShell, or API-based methods followed by execution from svchost.exe or taskeng.exe. Includes detection of hidden or anomalous scheduled tasks, especially those created under SYSTEM or suspicious user contexts. |
| AN1222 | Windows |
Enterprise |
DET0442
|
Detection of anomalous registry modifications to Subject Interface Packages (SIPs) or trust provider DLL mappings, unexpected loading of non-Microsoft cryptographic modules, or attempts to redirect WinVerifyTrust validation logic. Defender view focuses on registry tampering, suspicious DLL loads into trusted processes, and abnormal trust validation failures correlated across event streams. |
| AN1223 | Linux |
Enterprise |
DET0443
|
Detects anomalous process execution patterns where a process's parent terminates quickly after process creation or is re-parented to 'init' (PID 1), often indicating double-fork or daemon-style detachment. These behaviors sever the parent-child relationship and obscure the execution origin in process tree analysis. |
| AN1224 | macOS |
Enterprise |
DET0443
|
Detects execution patterns where a child process is detached from its original parent, often showing up under 'launchd' (PID 1) with no parent lineage. These breakages in the process tree are indicative of evasive techniques using |
| AN1225 | Windows |
Enterprise |
DET0444
|
Detects suspicious usage of common application-layer protocols (e.g., HTTP, HTTPS, DNS, SMB) by abnormal processes, with high outbound byte counts or irregular ports, possibly indicating command and control or data exfiltration. |
| AN1226 | Linux |
Enterprise |
DET0444
|
Detects suspicious curl, wget, or custom socket traffic that leverages DNS, HTTPS, or IRC-style protocols with unbalanced traffic or beacon-like intervals. |
| AN1227 | macOS |
Enterprise |
DET0444
|
Detects applications using abnormal protocols or high volume traffic not previously associated with the process image, such as Automator or AppleScript invoking curl or python sockets. |
| AN1228 | Network Devices |
Enterprise |
DET0444
|
Detects application-layer tunneling or unauthorized app protocols like DNS-over-HTTPS, embedded C2 in TLS/HTTP headers, or misused SMB traffic crossing VLANs. |
| AN1229 | Windows |
Enterprise |
DET0445
|
Suspicious process spawning (e.g., |
| AN1230 | Linux |
Enterprise |
DET0445
|
User-space tools (e.g., |
| AN1231 | macOS |
Enterprise |
DET0445
|
AppleScript, LaunchAgents, or remote login services ( |
| AN1232 | ESXi |
Enterprise |
DET0445
|
Direct use of |
| AN1233 | Network Devices |
Enterprise |
DET0445
|
Dynamic or static port forwarding rules added to route traffic through an internal host, or configuration changes to proxy firewall rules not aligned with baselined policy. |
| AN1234 | Linux |
Enterprise |
DET0446
|
Adversaries attempt to read sensitive files such as /etc/passwd and /etc/shadow for credential dumping. This may involve access to the files directly via command-line utilities (e.g., cat, less), creation of backup copies, or parsing through post-exploitation frameworks. Multi-event correlation includes elevated process execution, file access/read on sensitive paths, and anomalous read behaviors tied to non-root or unusual users. |
| AN1235 | Windows |
Enterprise |
DET0447
|
Adversary uses built-in tools like 'net user /add', PowerShell, or WMI to create a local user. Sequence: Account creation event (4720) follows process creation of a suspicious executable (e.g., powershell.exe or net.exe). |
| AN1236 | Linux |
Enterprise |
DET0447
|
Local user accounts are created via binaries like 'useradd', 'adduser', or by editing passwd/shadow. Behavior chain includes execution of user management binaries or modification of user database files. |
| AN1237 | macOS |
Enterprise |
DET0447
|
Account creation using 'dscl -create' or via GUI tools. Detection involves command execution and file changes to the local directory services database. |
| AN1238 | ESXi |
Enterprise |
DET0447
|
Account created using esxcli commands. Sequence includes esxcli execution and successful modification to account DB. |
| AN1239 | Containers |
Enterprise |
DET0447
|
Account created in a running container (e.g., via 'useradd' or by modifying /etc/passwd directly). Detectable via runtime telemetry (e.g., Falco or eBPF hooks). |
| AN1240 | Network Devices |
Enterprise |
DET0447
|
Account created via CLI using 'username' command or REST API. Detectable through AAA logging or CLI history telemetry. |
| AN1241 | Linux |
Enterprise |
DET0448
|
Detects the redirection of syscall execution flow via modification of VDSO code stubs or GOT entries to load and execute a malicious shared object through mmap and ptrace. |
| AN1242 | IaaS |
Enterprise |
DET0449
|
Detection focuses on abnormal or unauthorized cloud instance creation events. From a defender’s perspective, suspicious behavior includes VM/instance creation by rarely used or newly created accounts, creation events from unusual geolocations, or rapid sequences of snapshot creation followed by instance creation and mounting. Unexpected network or IAM policy changes applied to new instances can indicate adversarial use rather than legitimate provisioning. |
| AN1243 | Linux |
Enterprise |
DET0450
|
Monitor kernel module load/unload activity via modprobe, insmod, rmmod, or direct manipulation of /lib/modules. Correlate with installation of kernel headers, compilation commands, or downloads of .ko files. Detect anomalies in unsigned module loading or repeated module load attempts under non-root users. |
| AN1244 | macOS |
Enterprise |
DET0450
|
Detect user-initiated kextload commands or modifications to /Library/Extensions. Correlate with changes to KextPolicy database or unauthorized developer signing identities. Alert on attempts to disable SIP or load legacy extensions from unsigned sources. |
| AN1245 | Windows |
Enterprise |
DET0451
|
Defenders can identify PowerShell profile-based persistence by correlating file creation or modification in known profile locations with subsequent PowerShell process launches that do not use the |
| AN1246 | Windows |
Enterprise |
DET0452
|
Detection correlates abnormal installation or modification of root or code-signing certificates, creation/modification of suspicious registry keys for trust providers, and unusual module loads from non-standard locations. Identifies unsigned or improperly signed executables bypassing trust prompts, combined with persistence artifacts. |
| AN1247 | Linux |
Enterprise |
DET0452
|
Detection monitors extended attribute manipulation (xattr) to strip quarantine or trust metadata, anomalous installation of root certificates in /etc/ssl or /usr/local/share/ca-certificates, and unauthorized modification of system trust stores. Correlates with unexpected process execution involving package managers or custom certificate utilities. |
| AN1248 | macOS |
Enterprise |
DET0452
|
Detection monitors modification of code signing attributes, Gatekeeper/quarantine flags, and insertion of new trust certificates via security add-trusted-cert. Identifies adversary use of xattr to strip quarantine flags from downloaded binaries. Correlates with abnormal module loads bypassing SIP protections. |
| AN1249 | Network Devices |
Enterprise |
DET0453
|
Defenders may observe suspicious SNMP MIB enumeration through abnormal queries for large sets of OIDs, repeated SNMP GETBULK/GETNEXT requests, or queries originating from non-administrative IP addresses. Anomalous use of community strings, authentication failures, or enumeration activity outside maintenance windows may also indicate attempts to dump MIB contents. Correlation across syslog, NetFlow, and SNMP audit data can reveal chains of behavior such as repeated authentication failures followed by successful large-scale OID retrieval. |
| AN1250 | Linux |
Enterprise |
DET0454
|
Detects unauthorized modifications to PAM configuration files or shared object modules. Correlates file modification events under /etc/pam.d/ or /lib/security/ with unusual authentication activity such as multiple simultaneous logins, off-hours logins, or logons without corresponding physical/VPN access. |
| AN1251 | macOS |
Enterprise |
DET0454
|
Detects suspicious changes to macOS authorization and PAM plugin files. Correlates file modifications under /etc/pam.d/ or /Library/Security/SecurityAgentPlugins with unexpected authentication attempts or anomalous account usage. |
| AN1252 | Windows |
Enterprise |
DET0455
|
Detects behavioral chains where PowerShell is launched with encoded commands, unusual parent processes, or suspicious modules loaded, potentially followed by network connections or child process spawning. Supports detection of both direct (powershell.exe) and indirect (.NET automation) invocations. |
| AN1253 | Windows |
Enterprise |
DET0456
|
A process (often after stealing/creating a token) calls CreateProcessWithTokenW/CreateProcessAsUserW or uses runas to spawn a new process whose security context (SID/LogonId/IntegrityLevel) differs from its parent. Chain: (1) suspicious command/API → (2) privileged handle or token duplication/open → (3) new child process running as another user / higher integrity → (4) optional follow‑on privileged/lateral actions. |
| AN1254 | Windows |
Enterprise |
DET0457
|
Anomalous use of ICMP or UDP by non-network service processes for data exfiltration or remote control, especially if traffic bypasses proxy infrastructure or shows unusual flow patterns. |
| AN1255 | Linux |
Enterprise |
DET0457
|
ICMP or raw socket traffic generated by user-mode processes like bash, Python, or nc, typically using |
| AN1256 | macOS |
Enterprise |
DET0457
|
Unsigned binaries or interpreted scripts initiating non-standard protocols (ICMP, UDP, SOCKS) outside of baseline network behavior. |
| AN1257 | ESXi |
Enterprise |
DET0457
|
VMCI (Virtual Machine Communication Interface) traffic between guest and host, or between VMs, originating from non-management tools or unauthorized binaries. |
| AN1258 | Network Devices |
Enterprise |
DET0457
|
Non-standard port/protocol pairings or low-entropy ICMP traffic resembling tunneling patterns (e.g., fixed-size pings with delays). |
| AN1259 | Windows |
Enterprise |
DET0458
|
Adversary modifies Active Directory domain trust settings via |
| AN1260 | Identity Provider |
Enterprise |
DET0458
|
Adversary adds federated identity provider (IdP) or modifies tenant domain authentication from Managed to Federated. Detected via API, PowerShell, or Admin Portal through federation events like |
| AN1261 | Containers |
Enterprise |
DET0459
|
Detection of container image build activity directly on the host using Docker or Kubernetes APIs. Defenders may observe Docker build requests, anomalous Dockerfile instructions (such as downloading code from unknown IPs), or creation of new images followed by immediate deployment. This behavior chain typically consists of an unexpected image creation event correlated with outbound network communication to non-standard or untrusted destinations. |
| AN1262 | Windows |
Enterprise |
DET0460
|
Multiple failed authentication attempts using distinct username/password pairs from a single IP address or session within a short time window, targeting common services like RDP or SMB |
| AN1263 | Linux |
Enterprise |
DET0460
|
Rapid login failures across different users from a single IP address, targeting SSH or PAM login with distinct username-password pairs |
| AN1264 | macOS |
Enterprise |
DET0460
|
Burst of failed authentications with rotating usernames against loginwindow or remote management service using reused breached credentials |
| AN1265 | Identity Provider |
Enterprise |
DET0460
|
Same source IP performing multiple authentication attempts using known breached username/password combinations across different identities in Azure AD, Okta, or Duo |
| AN1266 | SaaS |
Enterprise |
DET0460
|
Multiple sign-in failures against cloud-based applications using username/password combinations leaked from unrelated domains |
| AN1267 | Network Devices |
Enterprise |
DET0460
|
Router/firewall/syslog logs showing authentication failures with unique usernames and reused credentials from same source IP |
| AN1268 | Containers |
Enterprise |
DET0460
|
Credential stuffing attempts against Kubernetes API or containerized login shells using stolen or leaked user credentials |
| AN1269 | Office Suite |
Enterprise |
DET0460
|
Use of leaked credential pairs against Outlook Web Access (OWA), Microsoft 365, or Exchange from a single client IP with multiple failures |
| AN1270 | IaaS |
Enterprise |
DET0460
|
Burst of failed login attempts across VM instances using leaked credential pairs from single IP in public cloud environments |
| AN1271 | Windows |
Enterprise |
DET0461
|
Anomalous creation or mounting of hidden partitions or virtual file systems. Defender view: detection of registry modifications linked to non-standard file systems, suspicious disk I/O patterns, or bootkit-like behavior where hidden volumes are accessed outside normal file system APIs. |
| AN1272 | Linux |
Enterprise |
DET0461
|
Unusual mounting of loopback or pseudo file systems not aligned with legitimate administrative activity. Defender view: monitoring auditd and syslog for mount commands involving suspicious mount points, reserved blocks, or device mappings indicative of hidden partitions. |
| AN1273 | macOS |
Enterprise |
DET0461
|
Hidden file system use through APFS containers or custom plist configuration. Defender view: anomalous use of hdiutil or diskutil to attach hidden partitions, modification of plist entries tied to system volumes, or suspicious raw disk access. |
| AN1274 | Windows |
Enterprise |
DET0462
|
Detects anomalous network traffic on UDP 5355 (LLMNR) and UDP 137 (NBT-NS) combined with unauthorized SMB relay attempts, registry modifications re-enabling multicast name resolution, or suspicious service creation indicative of adversary-in-the-middle credential interception. |
| AN1275 | Windows |
Enterprise |
DET0463
|
High volume of failed logon attempts followed by a successful one from a suspicious user, host, or timeframe |
| AN1276 | Linux |
Enterprise |
DET0463
|
Multiple authentication failures for valid or invalid users followed by success from same IP/user |
| AN1277 | Identity Provider |
Enterprise |
DET0463
|
Password spraying or brute force attempts across user pool within short time intervals |
| AN1278 | macOS |
Enterprise |
DET0463
|
Multiple failed authentications in unified logs (e.g., loginwindow or sshd) |
| AN1279 | SaaS |
Enterprise |
DET0463
|
Excessive login attempts followed by success from SaaS apps like O365, Dropbox, etc. |
| AN1280 | Windows |
Enterprise |
DET0464
|
Enumeration of saved Wi-Fi profiles and cleartext password retrieval using |
| AN1281 | Linux |
Enterprise |
DET0464
|
File access to NetworkManager connection configs and attempts to read PSK credentials from |
| AN1282 | macOS |
Enterprise |
DET0464
|
Use of the |
| AN1283 | Windows |
Enterprise |
DET0465
|
Detection of default account usage such as Guest or Administrator performing interactive or remote logons on systems outside of installation or maintenance windows. |
| AN1284 | Linux |
Enterprise |
DET0465
|
Monitoring for SSH logins from default accounts such as 'root', especially when login is via password and not key-based authentication. |
| AN1285 | Identity Provider |
Enterprise |
DET0465
|
Use of known default service accounts or root-level cloud accounts performing authentication or changes to IAM policy. |
| AN1286 | ESXi |
Enterprise |
DET0465
|
Abuse of system-generated or default privileged accounts such as 'root' or 'vpxuser' logging into ESXi hosts. |
| AN1287 | Network Devices |
Enterprise |
DET0465
|
Login activity from default admin credentials (e.g., 'admin', 'cisco') on routers, firewalls, and switches. |
| AN1288 | Windows |
Enterprise |
DET0466
|
Execution of Microsoft-signed scripts (e.g., pubprn.vbs, installutil.exe, wscript.exe, cscript.exe) used to proxy execution of untrusted or external binaries. Behavior is detected through command-line process lineage, child process spawning, and unsigned payload execution from signed parent. |
| AN1289 | Windows |
Enterprise |
DET0467
|
Detects thread local storage (TLS) callback injection by monitoring memory modifications to PE headers and TLS directory structures during or after process hollowing events, followed by anomalous thread behavior prior to main entry point execution. |
| AN1290 | Windows |
Enterprise |
DET0468
|
Detects rogue DHCP server activity and anomalous DHCP OFFER/ACK messages assigning unexpected DNS or gateway values. Detection correlates DHCP server role changes, DHCP exhaustion warnings, and sudden network configuration changes across endpoints. |
| AN1291 | Linux |
Enterprise |
DET0468
|
Detects rogue DHCP activity by monitoring syslog for dhclient messages assigning unauthorized DNS/gateway values. Packet capture or IDS can detect multiple competing DHCP OFFERs from non-authorized servers. |
| AN1292 | macOS |
Enterprise |
DET0468
|
Detects DHCP spoofing by monitoring unified logs for unexpected DHCP ACK/OFFER parameters and correlating with packet captures for multiple DHCP servers. Behavioral emphasis is on inconsistent DNS and gateway assignments that redirect traffic. |
| AN1293 | Network Devices |
Enterprise |
DET0469
|
Defenders may observe adversary attempts to patch system images by monitoring for anomalous file transfers (TFTP, SCP, FTP) of image files, unauthorized CLI commands altering boot system variables, integrity check mismatches between running and baseline OS images, and runtime memory manipulation attempts. Suspicious sequences include uploading a new image, modifying boot parameters, and subsequent reload/reboot of the device. In-memory patching attempts may manifest as debug commands or boot loader manipulation inconsistent with normal administrative activity. |
| AN1294 | Windows |
Enterprise |
DET0470
|
Untrusted processes creating outbound TLS/HTTPS connections with malformed certificates or header fields, often mismatched with target service behavior. Detects protocol impersonation attempts via traffic metadata analysis and host process lineage. |
| AN1295 | Linux |
Enterprise |
DET0470
|
Detection of binaries spawning encrypted sessions using OpenSSL or curl to external services with mismatched ports/protocols. Identifies behavior where internal services simulate trusted cloud service traffic patterns. |
| AN1296 | macOS |
Enterprise |
DET0470
|
Unsigned or suspicious applications initiating network traffic claiming to be browser, mail, or cloud clients. Detects impersonation via TLS fingerprint and User-Agent string deviation. |
| AN1297 | ESXi |
Enterprise |
DET0470
|
ESXi hosts initiating connections from non-standard daemons mimicking HTTP/HTTPS or SNMP traffic, but with irregular payload formats or expired/unsigned TLS certificates. |
| AN1298 | Windows |
Enterprise |
DET0471
|
Detects adversary tampering of shared directories via file drops (e.g., malicious LNK, EXE, VBS) followed by user execution or suspicious network activity. |
| AN1299 | Linux |
Enterprise |
DET0471
|
Detects script or binary modification within shared NFS/SMB directories followed by process execution from those paths. |
| AN1300 | macOS |
Enterprise |
DET0471
|
Detects modification of shared network folders via .app bundles or scripting files with hidden extensions (e.g., double extensions like docx.app). |
| AN1301 | SaaS |
Enterprise |
DET0471
|
Detects upload of malicious or unusual file types into cloud-shared folders, followed by user downloads or interactions. |
| AN1302 | Office Suite |
Enterprise |
DET0471
|
Detects embedded macros or scripts added to shared documents or use of external references to execute code. |
| AN1303 | Windows |
Enterprise |
DET0472
|
Detects suspicious registration of new password filter DLLs into the authentication process. Correlates registry modifications to LSASS Notification Packages with subsequent DLL creation and loading events. Observes anomalous file placement of DLLs in system directories followed by LSASS loading the new filter during logon/password change activity. |
| AN1304 | Containers |
Enterprise |
DET0473
|
Correlate the creation or modification of containers using restart policies (e.g., 'always') or DaemonSets with elevated host access, service account misuse, or privileged container contexts. Watch for manipulation of systemd units involving containers or pod scheduling targeting specific nodes or namespaces. |
| AN1305 | Windows |
Enterprise |
DET0474
|
Windows-specific environmental keying behavioral chain: (1) Rapid system information discovery through multiple techniques (WMI queries, registry enumeration, network share discovery, hostname/domain checks), (2) Target validation through specific environmental artifact collection (AD domain membership, network topology, installed software versions), (3) Cryptographic operation correlation indicating payload decryption based on collected environmental values, (4) Subsequent malicious code execution following successful environmental validation, (5) Temporal clustering of discovery activities suggesting automated environmental assessment |
| AN1306 | Linux |
Enterprise |
DET0474
|
Linux environmental keying behavioral chain: (1) System information gathering through native commands (uname, hostname, id, whoami, ifconfig/ip) and file system enumeration, (2) Network configuration discovery (route tables, DNS settings, network interfaces), (3) Filesystem and mount point analysis for target-specific directories or devices, (4) Process and service enumeration to identify target-specific software, (5) Cryptographic library usage correlation with collected environmental data, (6) Payload execution following successful environmental validation |
| AN1307 | macOS |
Enterprise |
DET0474
|
macOS environmental keying behavioral chain: (1) System information discovery through native utilities (system_profiler, sw_vers, hostname, dscl) and Security framework queries, (2) Hardware and software enumeration including serial numbers, installed applications, and system versions, (3) Network configuration assessment (networksetup, scutil) and wireless network discovery, (4) Keychain and security context validation, (5) Unified Logs correlation with cryptographic framework usage (CommonCrypto, Security.framework), (6) Application bundle execution following environmental validation |
| AN1308 | Windows |
Enterprise |
DET0475
|
Detects rundll32.exe invoked with atypical arguments (.dll, .cpl, javascript:, mshtml). DLLs not normally loaded by rundll32 are mapped into memory. Control_RunDLL or RunHTMLApplication invoked. Suspicious DLLs or scripts accessed from disk or network. Rundll32 reaches out to external domains (e.g., fetching .sct or .hta). |
| AN1309 | Windows |
Enterprise |
DET0476
|
Correlates creation of email forwarding rules or header anomalies (e.g., X-MS-Exchange-Organization-AutoForwarded) with suspicious process execution, file access of .pst/.ost files, and network connections to external SMTP servers. |
| AN1310 | Linux |
Enterprise |
DET0476
|
Detects file access to mbox/maildir files in conjunction with curl/wget/postfix execution, or anomalous shell scripts harvesting user mail directories. |
| AN1311 | macOS |
Enterprise |
DET0476
|
Monitors Mail.app database or maildir file access, automation via AppleScript, and abnormal mail rule creation using scripting or UI automation frameworks. |
| AN1312 | Office Suite |
Enterprise |
DET0476
|
Correlates unusual auto-forwarding rule creation via Exchange Web Services or Outlook rules engine, presence of X-MS-Exchange-Organization-AutoForwarded headers, and logon session anomalies from abnormal IPs. |
| AN1313 | Windows |
Enterprise |
DET0477
|
Adversaries using WinRM to remotely execute commands, launch child processes, or access WMI. The detection chain includes service use, network activity, remote session logon, and process creation within a short temporal window. |
| AN1314 | Windows |
Enterprise |
DET0478
|
Cause→effect chain: (1) User-facing app (Office/PDF/archiver/browser) records an open/click or abnormal event, then (2) a downloaded file is created in a user-writable path and/or decompressed, (3) the parent user app spawns a living-off-the-land binary (e.g., powershell/cmd/mshta/rundll32/msiexec/wscript/expand/zip) or installer, and (4) immediate outbound HTTP(S)/DNS/SMB from the same lineage. |
| AN1315 | Linux |
Enterprise |
DET0478
|
Cause→effect chain: (1) User app/browser/archiver logs an open/click or abnormal exit, (2) new executable/script/archive extracted into $HOME/Downloads, /tmp, or ~/.cache, (3) parent app spawns shell/interpreter (bash/sh/python/node/curl/wget) or desktop file, and (4) new outbound connection(s) from the child lineage. |
| AN1316 | macOS |
Enterprise |
DET0478
|
Cause→effect chain: (1) unified logs show application open/click or crash for Safari/Chrome/Office/Preview/archiver, (2) file write/extraction into ~/Downloads, /private/var/folders/* or ~/Library, (3) parent app spawns osascript/bash/zsh/curl/python or opens a quarantined app with Gatekeeper prompts, (4) network egress from child. |
| AN1317 | Containers |
Enterprise |
DET0478
|
Cause→effect chain in CI/dev desktops: (1) user triggers container run/pull after opening a doc/link/script, (2) newly created image/container uses unexpected external registry or entrypoint, (3) container starts and immediately egresses to suspicious destinations. |
| AN1318 | IaaS |
Enterprise |
DET0478
|
Cause→effect chain in cloud consoles: (1) user clicks link then invokes instance/image creation via API, (2) instance/image originates from external AMI or unknown image, (3) instance immediately egresses or retrieves payloads. |
| AN1319 | Windows |
Enterprise |
DET0479
|
Modification of COR_PROFILER-related environment variables or Registry keys (COR_ENABLE_PROFILING, COR_PROFILER, COR_PROFILER_PATH), combined with anomalous .NET process creation or unmanaged DLL loads. Defender observes registry modifications, suspicious process creation with altered environment variables, and profiler DLLs loaded unexpectedly into .NET CLR processes. |
| AN1320 | Linux |
Enterprise |
DET0480
|
Detects unauthorized modifications to login-facing web server files (e.g., index.php, login.js) typically tied to VPN, SSO, or intranet portals. Correlates suspicious file changes with remote access artifacts or web shell behavior. |
| AN1321 | Windows |
Enterprise |
DET0480
|
Detects tampering of IIS-based login pages (e.g., default.aspx, login.aspx) tied to VPN, OWA, or SharePoint via script injection or unexpected editor processes modifying web roots. |
| AN1322 | macOS |
Enterprise |
DET0480
|
Detects unauthorized changes to locally hosted login pages on macOS (common in developer VPN environments) and links file edits to cron jobs, background scripts, or SUID binaries. |
| AN1323 | Windows |
Enterprise |
DET0481
|
Correlate suspicious registry modifications to known COM object CLSIDs with subsequent DLL loads or unexpected binary execution paths. Detect placement of COM CLSID entries under HKEY_CURRENT_USER\Software\Classes\CLSID\ overriding default HKLM paths. Flag anomalous DLL loads traced back to hijacked COM registry changes. |
| AN1324 | Windows |
Enterprise |
DET0482
|
Detection of token duplication and impersonation attempts by correlating suspicious command-line executions (e.g., runas) with API calls to DuplicateToken, DuplicateTokenEx, ImpersonateLoggedOnUser, or SetThreadToken. The chain includes the initial command execution or in-memory API invocation → token handle duplication or thread token assignment → a new or existing process assuming the impersonated user's context. |
| AN1325 | Windows |
Enterprise |
DET0483
|
Enumeration of services via native CLI tools (e.g., |
| AN1326 | Linux |
Enterprise |
DET0483
|
Execution of service management commands like |
| AN1327 | macOS |
Enterprise |
DET0483
|
Discovery via launchctl commands, or process enumeration using |
| AN1328 | IaaS |
Enterprise |
DET0484
|
Spike in object access from new IAM user or role followed by data exfiltration to external IPs |
| AN1329 | SaaS |
Enterprise |
DET0484
|
OAuth token granted to external app followed by download of high-volume files in OneDrive/Google Drive |
| AN1330 | Office Suite |
Enterprise |
DET0484
|
Internal user account accesses shared links outside org followed by mass file download |
| AN1331 | Windows |
Enterprise |
DET0485
|
Identify repeated DNS resolutions where the same domain name returns multiple IPs in short succession, combined with low TTL values and high query volume from unusual processes. Correlate with process lineage (e.g., Office apps spawning abnormal DNS lookups). |
| AN1332 | Linux |
Enterprise |
DET0485
|
Monitor resolver logs and auditd events for domains resolving to a rotating set of IPs within very short TTL intervals. Correlate high query rates from non-browser applications (e.g., python, curl). |
| AN1333 | macOS |
Enterprise |
DET0485
|
Use unified logs to identify processes issuing repeated DNS queries where the resolved IP addresses change frequently within very short TTL values. Correlate with outbound network traffic to validate C2-like patterns. |
| AN1334 | ESXi |
Enterprise |
DET0485
|
Monitor ESXi syslog and esxcli outputs for abnormal DNS resolver behavior, such as frequent domain-to-IP changes or unauthorized modifications of DNS settings used by management agents. Correlate domain lookups with short TTL values. |
| AN1335 | Windows |
Enterprise |
DET0486
|
Identifies abuse of odbcconf.exe to execute malicious DLLs using the REGSVR command flag. Behavior chain: (1) Process creation of odbcconf.exe with /REGSVR or /A {REGSVR ...} arguments → (2) DLL load by odbcconf.exe of non-standard or unsigned modules → (3) Optional follow-on process creation or network activity from loaded DLL. |
| AN1336 | Windows |
Enterprise |
DET0487
|
A high volume of authentication failures using a single password (or small set) across many different user accounts within a defined time window |
| AN1337 | Linux |
Enterprise |
DET0487
|
Authentication failures across different accounts using a repeated or similar password via SSH or PAM stack within a short window |
| AN1338 | macOS |
Enterprise |
DET0487
|
Multiple failed login attempts across different users using common password patterns (e.g., 'Welcome2023') |
| AN1339 | Identity Provider |
Enterprise |
DET0487
|
Sign-in failures across enterprise SSO applications or SaaS platforms from same IP address using the same password against multiple user identities |
| AN1340 | Network Devices |
Enterprise |
DET0487
|
Authentication failure logs on routers/switches showing repeated use of default or common passwords across multiple accounts |
| AN1341 | Containers |
Enterprise |
DET0487
|
Repeated failed authentication attempts to container APIs, control planes, or login shells across many user names using same password |
| AN1342 | Office Suite |
Enterprise |
DET0487
|
Failed authentication attempts across user mailboxes using identical or common passwords (e.g., OWA brute attempts) |
| AN1343 | SaaS |
Enterprise |
DET0487
|
SaaS applications receiving authentication failures for dozens of accounts using same password or login signature |
| AN1344 | Windows |
Enterprise |
DET0488
|
Behavioral chain: (1) a login from a third-party account or untrusted source network establishes an interactive/remote session; (2) the session acquires elevated privileges or accesses sensitive resources atypical for that account; (3) subsequent lateral movement or data access occurs from the same session/device. Correlate Windows logon events, token elevation/privileged use, and resource access with third-party context. |
| AN1345 | Linux |
Enterprise |
DET0488
|
Behavioral chain: (1) sshd or federated SSO logins from third-party networks or identities; (2) rapid sudo/su privilege elevation; (3) access to sensitive paths or east-west SSH. Correlate auth logs, process execution, and network flows. |
| AN1346 | macOS |
Enterprise |
DET0488
|
Behavioral chain: (1) third-party interactive login or mobileconfig-based device enrollment; (2) privilege use or admin group change; (3) lateral movement mounts/ssh. Correlate unified logs and network telemetry. |
| AN1347 | Identity Provider |
Enterprise |
DET0488
|
Behavioral chain: (1) delegated admin or external identity establishes session (e.g., partner/reseller DAP, B2B guest, SAML/OAuth trust); (2) role elevation or app consent/permission grant; (3) downstream privileged actions in the tenant. Correlate IdP sign-in, admin/role assignment, and consent/admin-on-behalf events. |
| AN1348 | IaaS |
Enterprise |
DET0488
|
Behavioral chain: (1) cross-account or third-party principal assumes a role into the tenant/subscription/project; (2) privileged API calls are made in short succession; (3) access originates from unfamiliar networks or geos. Correlate assume-role/federation events with sensitive API usage. |
| AN1349 | SaaS |
Enterprise |
DET0488
|
Behavioral chain: (1) third-party app or admin connects via OAuth/marketplace install; (2) high-privilege scopes granted; (3) anomalous actions (mass read/exports, admin changes). |
| AN1350 | Office Suite |
Enterprise |
DET0488
|
Behavioral chain: (1) delegated administration offers/relationships created or modified by partner tenants; (2) mailbox delegation/impersonation enabled; (3) follow-on access from partner IPs. |
| AN1351 | Windows |
Enterprise |
DET0489
|
A process explicitly forges its parent using EXTENDED_STARTUPINFO + PROC_THREAD_ATTRIBUTE_PARENT_PROCESS (UpdateProcThreadAttribute → CreateProcess[A/W]/CreateProcessAsUserW) or other Native API paths, resulting in mismatched/implausible lineage across ETW EventHeader ProcessId, Security 4688 Creator Process ID/Name, and sysmon ParentProcessGuid. Often paired with privilege escalation when the chosen parent runs as SYSTEM. |
| AN1352 | Containers |
Enterprise |
DET0490
|
Detection of adversary attempts to enumerate containers, pods, nodes, and related resources within containerized environments. Defenders may observe anomalous API calls to Docker or Kubernetes (e.g., 'docker ps', 'kubectl get pods', 'kubectl get nodes'), unusual account activity against the Kubernetes dashboard, or unexpected queries against container metadata endpoints. These events should be correlated with user context and network activity to reveal resource discovery attempts. |
| AN1353 | Windows |
Enterprise |
DET0491
|
Suspicious enumeration of attached peripherals via WMI, PowerShell, or low-level API calls potentially chained with removable device interactions. |
| AN1354 | Linux |
Enterprise |
DET0491
|
Enumeration of USB and other peripheral hardware via udevadm, lshw, or /sys or /proc interfaces in proximity to collection or mounting behavior. |
| AN1355 | macOS |
Enterprise |
DET0491
|
Execution of system utilities like 'system_profiler' and 'ioreg' to enumerate hardware components or USB devices, particularly if followed by clipboard, file, or network activity. |
| AN1356 | IaaS |
Enterprise |
DET0492
|
Defenders should monitor for anomalous or unauthorized changes to cloud compute configurations that alter quotas, tenant-wide policies, subscription associations, or allowed deployment regions. From a defender’s perspective, suspicious behavior chains include a sudden increase in compute quota requests followed by new instance or resource creation, policy modifications that weaken security restrictions, or enabling previously unused/unsupported cloud regions. Correlation across identity, configuration, and subsequent provisioning logs is critical to distinguish legitimate administrative activity from adversarial abuse. |
| AN1357 | Windows |
Enterprise |
DET0493
|
Detects anomalous use of COM, DDE, or named pipes for execution. Correlates creation or access of IPC mechanisms (e.g., named pipes, COM objects) with unusual parent-child process relationships or code injection patterns (e.g., Office spawning cmd.exe via DDE). |
| AN1358 | Linux |
Enterprise |
DET0493
|
Detects abuse of UNIX domain sockets, pipes, or message queues for unauthorized code execution. Correlates unexpected socket creation with suspicious binaries, abnormal shell pipelines, or injected processes establishing IPC channels. |
| AN1359 | macOS |
Enterprise |
DET0493
|
Detects anomalous use of Mach ports, Apple Events, or XPC services for inter-process execution or code injection. Focuses on unexpected processes attempting to send privileged Apple Events (e.g., automation scripts injecting into security-sensitive apps). |
| AN1360 | Network Devices |
Enterprise |
DET0494
|
Defenders may observe attempts to disable dedicated crypto hardware on network devices, often visible through anomalous CLI commands, unexpected firmware or configuration updates, and degraded encryption performance. Suspicious indicators include commands that alter hardware acceleration settings (e.g., disabling AES-NI or crypto engines), modification of system image files, or logs showing fallback from hardware to software encryption. Network traffic analysis may also reveal a sudden downgrade in throughput or cipher negotiation behavior consistent with the absence of hardware acceleration. |
| AN1361 | Windows |
Enterprise |
DET0495
|
Monitor for anomalous access to financial applications, browser-based banking sessions, or enterprise ERP systems from Windows endpoints. Detect mass emailing of payment instructions, sudden rule changes in Outlook for financial staff, or use of clipboard data exfiltration tied to cryptocurrency wallet addresses. |
| AN1362 | Linux |
Enterprise |
DET0495
|
Monitor server and endpoint logs for unusual outbound network connections to cryptocurrency nodes, unauthorized scripts accessing financial systems, or automation targeting payment file formats. Detect curl/wget activity aimed at exfiltrating transaction data or credentials from financial apps. |
| AN1363 | macOS |
Enterprise |
DET0495
|
Monitor unified logs for access to payment applications, browser plug-ins, or Apple Pay services from non-standard processes. Detect anomalous use of Automator scripts or keychain extraction targeting financial account credentials. |
| AN1364 | SaaS |
Enterprise |
DET0495
|
Monitor SaaS financial systems (e.g., QuickBooks, Workday, SAP S/4HANA cloud) for unauthorized access, rule changes, or mass export of financial data. Detect anomalous transfers initiated via SaaS APIs or new MFA-disabled logins targeting finance apps. |
| AN1365 | Office Suite |
Enterprise |
DET0495
|
Monitor email and document management systems for fraudulent invoices, impersonation of vendors, or BEC-style payment redirections. Detect abnormal editing of invoice templates, or emails containing known fraud language combined with attachment delivery. |
| AN1366 | Windows |
Enterprise |
DET0496
|
Chain of remote access tool behavior: (1) initial execution of remote-control/assist agent or GUI under user context; (2) persistence via service or autorun; (3) long-lived outbound connection/tunnel to external infrastructure; (4) interactive control signals such as shell or file-manager child processes spawned by the RAT parent. |
| AN1367 | Linux |
Enterprise |
DET0496
|
Sequence of RAT agent execution, systemd persistence, and long-lived external egress; optional interactive shells spawned from the agent. |
| AN1368 | macOS |
Enterprise |
DET0496
|
Electron/GUI or headless RAT execution followed by LaunchAgent/Daemon persistence and persistent external connections; interactive children (osascript/sh/curl) spawned by parent. |
| AN1369 | Windows |
Enterprise |
DET0497
|
Detection of adversary behavior that disables or modifies security tools, including killing AV/EDR processes, stopping services, altering Sysmon registry keys, or tampering with exclusion lists. Defenders observe process/service termination, registry modification, and abnormal absence of expected telemetry. |
| AN1370 | Linux |
Enterprise |
DET0497
|
Detection of adversaries attempting to stop or disable host-based security agents by killing daemons, unloading kernel modules, or modifying init/systemd service configurations. |
| AN1371 | macOS |
Enterprise |
DET0497
|
Detection of adversary disabling endpoint security tools by unloading launch agents/daemons, modifying configuration profiles, or using security/uninstall commands to remove agents. |
| AN1372 | IaaS |
Enterprise |
DET0497
|
Detection of adversaries disabling cloud monitoring and logging agents such as CloudWatch, Google Cloud Monitoring, or Azure Monitor by API calls or agent process termination. |
| AN1373 | Containers |
Enterprise |
DET0497
|
Detection of adversaries tampering with container runtime security plugins, disabling admission controllers, or stopping monitoring sidecars. |
| AN1374 | Network Devices |
Enterprise |
DET0497
|
Detection of adversaries modifying startup configuration files to disable signature verification, logging, or monitoring features. |
| AN1375 | Windows |
Enterprise |
DET0498
|
A process creates a brand‑new logon session/token (LogonUser/LsaLogonUser) and then assigns/impersonates it (SetThreadToken/ImpersonateLoggedOnUser) to run actions under that freshly created security context. Chain: (1) suspicious command or script block (e.g., runas /netonly, PowerShell P/Invoke of LogonUser) → (2) ETW/API evidence of LogonUser/SetThreadToken → (3) Security 4624 New Logon (often LogonType=9 NewCredentials or 2/3 from a non‑interactive parent) with no interactive desktop → (4) sysmon 1 process(es) executing with the new LogonId/SID different from the parent process → (5) optional privileged ops/lateral movement. |
| AN1376 | Windows |
Enterprise |
DET0499
|
Establishing network connections on uncommon ports or protocols following C2 disruption or blocking. Often executed by processes that typically exhibit no network activity. |
| AN1377 | Linux |
Enterprise |
DET0499
|
Creation of outbound connections on alternate ports or using covert transport (e.g., ICMP, DNS) from non-network-intensive processes, following known disruption or blocked traffic. |
| AN1378 | macOS |
Enterprise |
DET0499
|
Outbound fallback traffic from low-profile or background launch agents using unusual protocols or destinations after primary channel inactivity. |
| AN1379 | ESXi |
Enterprise |
DET0499
|
Outbound traffic from host management services or guest-to-host interactions over unusual interfaces (e.g., backdoor API endpoints or external VPN tunnels). |
| AN1380 | Windows |
Enterprise |
DET0500
|
Privileged or rarely used accounts performing bulk access to SharePoint files or metadata over a short time window, indicating potential scripted collection of sensitive internal documents. |
| AN1381 | Windows |
Enterprise |
DET0501
|
Detects compilation activity using csc.exe, ilasm.exe, or msbuild.exe initiated by user-space processes outside typical development environments, followed by execution or network activity from newly written binaries. |
| AN1382 | Linux |
Enterprise |
DET0501
|
Detects GCC or Clang invoked on suspicious file paths (e.g., /tmp/, ~/Downloads) with output to executable binaries, followed by execution or outbound traffic from these binaries. |
| AN1383 | macOS |
Enterprise |
DET0501
|
Detects non-standard compilation activity via Xcode CLI tools or bundled GCC/MONO packages writing new executable files and executing them outside dev environments (e.g., user Downloads folder). |
| AN1384 | Windows |
Enterprise |
DET0502
|
Abuse of file/registry attributes to hide malicious files, directories, or services. Defender view: detection of attrib.exe setting hidden/system flags, creation of Alternate Data Streams, or registry keys altering file visibility. |
| AN1385 | Linux |
Enterprise |
DET0502
|
Hidden file creation using leading '.' or file attribute changes with chattr (immutable/hidden flags). Defender view: detect execution of chattr, lsattr anomalies, and unusual hidden files appearing in system directories. |
| AN1386 | macOS |
Enterprise |
DET0502
|
Hidden files via 'chflags hidden' or Apple-specific attributes, LaunchAgents/LaunchDaemons placed in non-standard hidden directories. Defender view: detect command execution modifying file flags and unusual plist creation in hidden paths. |
| AN1387 | ESXi |
Enterprise |
DET0502
|
Abuse of VMFS or ESXi shell to hide datastore files, renaming/moving VMDK or VMX files into hidden directories. Defender view: anomalous ESXi shell commands or file operations obscuring VM artifacts. |
| AN1388 | Office Suite |
Enterprise |
DET0502
|
Malicious macros or embedded objects hidden within Office documents by renaming streams or using hidden OLE objects. Defender view: detection of hidden macro streams or objects in documents correlated with anomalous execution. |
| AN1389 | Windows |
Enterprise |
DET0503
|
Detects the execution of non-browser processes establishing outbound encrypted network connections using uncommon symmetric encryption protocols (e.g., AES via PowerShell or custom scripts) to alternate external destinations. |
| AN1390 | Linux |
Enterprise |
DET0503
|
Detects command-line utilities or scripts using encryption libraries or symmetric algorithms (e.g., OpenSSL AES, GPG, Python + PyCrypto) in conjunction with outbound file transfers or traffic to external destinations. |
| AN1391 | macOS |
Enterprise |
DET0503
|
Detects symmetric key-based encryption operations (e.g., AES via Python, AppleScript, or OpenSSL) followed by unusual outbound connections from non-browser applications or scripted tools. |
| AN1392 | ESXi |
Enterprise |
DET0503
|
Detects unexpected encrypted egress traffic from management services (e.g., hostd) or guest VMs utilizing symmetric encryption without traditional protocols (e.g., FTP with embedded AES ciphertext). |
| AN1393 | Windows |
Enterprise |
DET0504
|
Detects anomalous use of Dynamic Data Exchange (DDE) for code execution, such as Office applications (WINWORD.EXE, EXCEL.EXE) spawning command interpreters, or loading unusual modules through DDEAUTO/DDE formulas. Correlates suspicious parent-child process relationships, registry keys enabling DDE, and module loads inconsistent with normal Office usage. |
| AN1394 | Windows |
Enterprise |
DET0505
|
Detection of command-line activity exhibiting syntactic obfuscation patterns, such as excessive escape characters, base64 encoding, command concatenation, or outlier command length and entropy. |
| AN1395 | Linux |
Enterprise |
DET0505
|
Detection of shell commands that leverage encoded execution, command chaining, excessive piping, or unusual token patterns indicative of obfuscation. |
| AN1396 | macOS |
Enterprise |
DET0505
|
Detection of obfuscated commands via shell, osascript, or AppleScript interpreters using unusual tokens, encoding, variable substitution, or runtime string reconstruction. |
| AN1397 | Windows |
Enterprise |
DET0506
|
Detection of mshta.exe execution where command-line arguments reference remote or local HTA/script content (VBScript/JScript) followed by subsequent file creation, network retrieval, or process spawning that indicates payload execution outside standard Internet Explorer security context. Correlation includes parent process lineage, command-line inspection, and network connection creation to untrusted or anomalous endpoints. |
| AN1398 | Windows |
Enterprise |
DET0507
|
Adversary gains high integrity or special privileges (e.g., SeDebugPrivilege), locates a running browser process, opens it with write/inject rights, and modifies it (e.g., CreateRemoteThread / DLL load) to inherit cookies/tokens or establish a browser pivot. Optional step: create a new logon session or use explicit credentials, then drive the victim browser to intranet resources. |
| AN1399 | Windows |
Enterprise |
DET0508
|
Detects process injection by correlating memory manipulation API calls (e.g., VirtualAllocEx, WriteProcessMemory), suspicious thread creation (e.g., CreateRemoteThread), and unusual DLL loads within another process's context. |
| AN1400 | Linux |
Enterprise |
DET0508
|
Detects ptrace- or memfd-based process injection through audit logs capturing system calls (e.g., ptrace, mmap) targeting running processes along with suspicious file descriptors or memory writes. |
| AN1401 | macOS |
Enterprise |
DET0508
|
Detects memory-based injection by monitoring |
| AN1402 | Windows |
Enterprise |
DET0509
|
Detects suspicious access to browser session cookie storage (e.g., Chrome’s |
| AN1403 | Linux |
Enterprise |
DET0509
|
Detects access to known browser cookie files (e.g., |
| AN1404 | macOS |
Enterprise |
DET0509
|
Detects unauthorized access to browser cookie paths (e.g., |
| AN1405 | Office Suite |
Enterprise |
DET0509
|
Detects automation macros or VBA scripts in documents that access browser file paths, read cookie data, or attempt to exfiltrate browser session tokens over HTTP. |
| AN1406 | SaaS |
Enterprise |
DET0509
|
Detects use of session cookies or authentication tokens from unusual user agents or locations. Identifies token reuse without reauthentication or attempts to bypass MFA using previously stolen cookies. |
| AN1407 | Windows |
Enterprise |
DET0510
|
Detects suspicious SVG file creation or download events followed by script engine execution (e.g., wscript.exe, mshta.exe, rundll32.exe), network callbacks, or browser-based credential collection. |
| AN1408 | Linux |
Enterprise |
DET0510
|
Detects downloaded SVG files followed by execution of browser processes or tools like xdg-open, and rapid follow-on network connections or process spawns to interpreters like python or bash. |
| AN1409 | macOS |
Enterprise |
DET0510
|
Detects SVGs downloaded via browser that invoke AppleScript, osascript, or JavaScriptCore processes, followed by network egress or file drop to LaunchAgents or ~/Library. |
| AN1410 | Windows |
Enterprise |
DET0511
|
Adversary mounts a USB device and begins enumerating, copying, or compressing files using scripting engines, cmd, or remote access tools. |
| AN1411 | Linux |
Enterprise |
DET0511
|
Adversary mounts external drive to /media or /mnt then accesses or copies targeted data via shell, cp, or tar. |
| AN1412 | macOS |
Enterprise |
DET0511
|
Adversary attaches USB drive and accesses sensitive files using Finder, cp, or bash scripts. |
| AN1413 | Windows |
Enterprise |
DET0512
|
Detects non-browser processes that establish encrypted outbound connections (e.g., TLS/SSL) to unfamiliar or atypical destinations for the host/user, following a data staging or compression event. |
| AN1414 | Linux |
Enterprise |
DET0512
|
Detects staged file access (e.g., archive or obfuscation), followed by an encrypted outbound connection (TLS/HTTPS) from unusual processes such as curl/wget, Python scripts, or custom binaries. |
| AN1415 | macOS |
Enterprise |
DET0512
|
Detects abnormal encrypted network connections (via TLS/HTTPS) initiated by non-browser binaries, particularly after sensitive file access or compression events. |
| AN1416 | ESXi |
Enterprise |
DET0512
|
Detects unexpected encrypted outbound connections from management components or guest VMs using TLS, particularly after data volume spikes or script-based orchestration from within guest environments. |
| AN1417 | Windows |
Enterprise |
DET0513
|
Detects adversary behavior accessing Windows cached domain credential files using tools like Mimikatz, reg.exe, or PowerShell, often combined with registry exports or LSASS memory scraping. |
| AN1418 | Linux |
Enterprise |
DET0513
|
Detects access to SSSD or Quest VAS cached credential databases using tdbdump or other file access patterns, requiring sudo/root access. |
| AN1419 | Windows |
Enterprise |
DET0514
|
Detects exploitation attempts targeting vulnerable kernel drivers or OS components, often followed by unusual process or token behavior. |
| AN1420 | Linux |
Enterprise |
DET0514
|
Detects escalation via vulnerable setuid binaries or kernel modules, often chained with unusual access to /proc/kallsyms or /dev/kmem. |
| AN1421 | macOS |
Enterprise |
DET0514
|
Detects use of vulnerable kernel extensions or entitlements abused via setuid or AppleScript injection chains. |
| AN1422 | Containers |
Enterprise |
DET0514
|
Detects container breakout behavior via exploitation (e.g., DirtyPipe, CVE-2022-0847), followed by host OS interaction or escalated capability assignment. |
| AN1423 | Containers |
Enterprise |
DET0515
|
Access and retrieval of container service account tokens followed by unauthorized API requests using those tokens to interact with the Kubernetes API server or internal services. |
| AN1424 | IaaS |
Enterprise |
DET0515
|
Token retrieval from instance metadata endpoints such as AWS IMDS or Azure IMDS, followed by API usage using the obtained token from non-standard applications. |
| AN1425 | Identity Provider |
Enterprise |
DET0515
|
Unusual OAuth app registration followed by user-granted OAuth tokens and subsequent high-privilege resource access via those tokens. |
| AN1426 | Office Suite |
Enterprise |
DET0515
|
Use of OAuth tokens by third-party apps to access user mail, calendar, or SharePoint resources where the token was granted recently or via spearphishing. |
| AN1427 | SaaS |
Enterprise |
DET0515
|
Programmatic access to user content via stolen access tokens in platforms like Slack, GitHub, Google Workspace — especially from new IPs, apps, or excessive resource access. |
| AN1428 | Windows |
Enterprise |
DET0516
|
Detects the execution of scripting or command interpreters (e.g., powershell.exe, cmd.exe, wscript.exe) outside expected administrative time windows or from abnormal user contexts, often followed by encoded/obfuscated arguments or secondary execution events. |
| AN1429 | Linux |
Enterprise |
DET0516
|
Detects use of shell interpreters (e.g., bash, sh, python, perl) initiated by users or processes not normally executing them, especially when chaining suspicious utilities like netcat, curl, or ssh. |
| AN1430 | macOS |
Enterprise |
DET0516
|
Detects launch of command-line interpreters via Terminal, Automator, or hidden |
| AN1431 | ESXi |
Enterprise |
DET0516
|
Detects use of 'esxcli system' or direct interpreter commands (e.g., busybox shell) invoked from SSH or host terminal unexpectedly. |
| AN1432 | Network Devices |
Enterprise |
DET0516
|
Identifies CLI interpreter access (e.g., Cisco IOS, Juniper JUNOS) via |
| AN1433 | Windows |
Enterprise |
DET0517
|
Detection focuses on unauthorized manipulation of .NET AppDomainManager behavior. Defenders may observe suspicious creation of new AppDomains within trusted processes, anomalous loading of assemblies via non-standard configuration files, or registry/environment variable changes redirecting AppDomainManager to malicious assemblies. Correlated events include config file tampering, new process creation of .NET host processes (e.g., w3wp.exe, powershell.exe) with modified runtime parameters, and module loads of unusual or unsigned .NET DLLs. |
| AN1434 | Windows |
Enterprise |
DET0518
|
Executable or script generating large outbound network traffic targeting remote hosts or known amplification ports |
| AN1435 | Linux |
Enterprise |
DET0518
|
Flooding tools like hping3 or nping sending large volumes of packets across multiple ports or IPs |
| AN1436 | Windows |
Enterprise |
DET0519
|
Adversaries inject VBA macros into Office templates such as Normal.dotm or Personal.xlsb or redirect Office template load path via registry key (GlobalDotName) to gain persistence. Template macros trigger execution of malicious code on application startup. |
| AN1437 | Office Suite |
Enterprise |
DET0519
|
Malicious VBA macros embedded in base templates like Normal.dotm or Personal.xlsb are automatically loaded and executed at startup. Template path may be hijacked to load a remote or attacker-controlled template via GlobalDotName registry setting. |
| AN1438 | Linux |
Enterprise |
DET0520
|
Detects log-clearing behavior by correlating suspicious command execution targeting log files under /var/log/, anomalous deletions or truncations of system logs, and unusual child processes (e.g., shell pipelines or redirections). |
| AN1439 | macOS |
Enterprise |
DET0520
|
Detects adversary clearing log files on macOS by correlating calls to shell utilities (e.g., echo >, rm, truncate) targeting files in /var/log/ with unusual context (non-administrative users or abnormal process lineage). |
| AN1440 | Windows |
Enterprise |
DET0521
|
Detects suspicious use of PowerShell, .NET, or script interpreters to spawn processes that mimic UAC prompts, often with credential capture dialogue boxes invoked from non-standard parent processes. |
| AN1441 | Linux |
Enterprise |
DET0521
|
Detects GUI-based credential prompts invoked via zenity/kdialog/dialog or X11 APIs from non-user-facing scripts or background shell sessions, often with authentication-related text. |
| AN1442 | macOS |
Enterprise |
DET0521
|
Detects AppleScript or Objective-C usage to generate fake authentication windows (e.g., using display dialog or NSAlert) from user-launched or persistence-related processes. |
| AN1443 | Windows |
Enterprise |
DET0522
|
Detects anomalous Kerberos activity such as forged or stolen tickets by correlating malformed fields in logon events, RC4-encrypted TGTs, or TGS requests without corresponding TGT requests. Also detects suspicious processes accessing LSASS memory for ticket extraction. |
| AN1444 | Linux |
Enterprise |
DET0522
|
Detects suspicious access to SSSD secrets database and Kerberos key material indicating ticket theft or replay attempts. Correlates anomalous file access with unusual Kerberos service ticket requests. |
| AN1445 | macOS |
Enterprise |
DET0522
|
Detects attempts to forge or replay Kerberos tickets by monitoring Unified Logs for anomalous kinit/klist activity and correlating unusual authentication sequences. |
| AN1446 | Windows |
Enterprise |
DET0523
|
Monitors execution of administrative utilities (e.g., bcdedit.exe) or registry modifications that disable Driver Signature Enforcement (DSE) or enable Test Signing. Correlates command-line activity, registry changes, and subsequent process executions that bypass signing enforcement. |
| AN1447 | macOS |
Enterprise |
DET0523
|
Detects modification of System Integrity Protection (SIP) or code signing enforcement policies through csrutil or kernel variable tampering. Correlates execution of csrutil disable commands with subsequent policy state changes and anomalous unsigned process executions. |
| AN1448 | Windows |
Enterprise |
DET0524
|
A remote host sends a short sequence of failed connection attempts (RST/ICMP unreachable) to a set of closed ports. Within a brief window the endpoint (a) adds/enables a firewall rule or (b) a sniffer-backed process begins listening or opens a new socket, after which a successful connection occurs. Also detects Wake-on-LAN magic packets seen on local segment. |
| AN1449 | Linux |
Enterprise |
DET0524
|
Closed-port knock sequence from a remote IP followed by on-host firewall change (iptables/nftables) or daemon starts listening (socket open) and a successful TCP/UDP connect. Optional detection of libpcap/raw-socket sniffers spawning to watch for secret values. |
| AN1450 | macOS |
Enterprise |
DET0524
|
Remote knock sequence followed by PF/socketfilterfw rule update or a background process listening on a new port; then a successful TCP session. Also flags WoL magic packets on local segment. |
| AN1451 | Network Devices |
Enterprise |
DET0524
|
Crafted ‘synful knock’ patterns toward routers/switches (same src hits interface/broadcast/network address on same port in short order) followed by ACL/telnet/SSH enablement or module change. Detect device image/ACL updates then a new mgmt session. |
| AN1452 | Windows |
Enterprise |
DET0525
|
Process creation and command-line execution of native system discovery utilities such as |
| AN1453 | Linux |
Enterprise |
DET0525
|
Execution of system enumeration commands such as |
| AN1454 | macOS |
Enterprise |
DET0525
|
Execution of system info utilities like |
| AN1455 | ESXi |
Enterprise |
DET0525
|
Execution of |
| AN1456 | IaaS |
Enterprise |
DET0525
|
Use of cloud API calls (e.g., AWS EC2 DescribeInstances, Azure VM Inventory) to enumerate system configurations across assets. |
| AN1457 | Network Devices |
Enterprise |
DET0525
|
Execution of |
| AN1458 | Windows |
Enterprise |
DET0526
|
Detects adversarial archiving of files prior to exfiltration by correlating execution of compression/encryption utilities (e.g., makecab.exe, rar.exe, 7z.exe, powershell Compress-Archive) with subsequent creation of large compressed or encrypted files. Identifies abnormal process lineage involving crypt32.dll usage, command-line arguments invoking compression switches, and file write operations to temporary or staging directories. |
| AN1459 | Linux |
Enterprise |
DET0526
|
Detects adversarial archiving activity through invocation of utilities like tar, gzip, bzip2, or openssl used in non-administrative or unusual contexts. Correlates command execution patterns with file creation of compressed/encrypted outputs in staging directories (e.g., /tmp, /var/tmp). |
| AN1460 | macOS |
Enterprise |
DET0526
|
Detects use of macOS-native archiving or encryption tools (zip, ditto, hdiutil) for staging collected data. Identifies unexpected invocation of archive utilities by Office apps, browsers, or background daemons. Correlates file creation of .zip/.dmg containers with process lineage anomalies. |
| AN1461 | Windows |
Enterprise |
DET0527
|
Execution of files containing right-to-left override characters (U+202E) to masquerade true file extensions. Often found in phishing payloads or file downloads. |
| AN1462 | macOS |
Enterprise |
DET0527
|
Execution of files with reversed filename extensions using Unicode RTLO character. Frequently used to deceive Gatekeeper and users in Safari or Mail-based phishing. |
| AN1463 | Linux |
Enterprise |
DET0527
|
Execution of user-downloaded or created scripts with hidden extensions due to RTLO character insertion in filename, often present in desktop environments or phishing campaigns. |
| AN1464 | Windows |
Enterprise |
DET0528
|
Execution of PubPrn.vbs via cscript.exe using the 'script:' moniker to load and execute a remote .sct scriptlet file, bypassing signature validation and proxying remote payloads through a signed Microsoft script host. |
| AN1465 | Windows |
Enterprise |
DET0529
|
Unusual or suspicious processes loading critical native API DLLs (e.g., ntdll.dll, kernel32.dll) followed by direct syscall behavior, memory manipulation, or hollowing. |
| AN1466 | Linux |
Enterprise |
DET0529
|
Userland processes invoking syscall-heavy libraries (libc, glibc) followed by fork, mmap, or ptrace behavior commonly associated with code injection or memory manipulation. |
| AN1467 | macOS |
Enterprise |
DET0529
|
Execution of processes that link to CoreServices or Foundation APIs followed by creation of memory regions, code execution, or abnormal library injection. |
| AN1468 | Windows |
Enterprise |
DET0530
|
An SMB-based remote file share access followed by lateral movement actions such as remote service creation, task scheduling, or suspicious process execution on the target host using ADMIN$ or C$ shares. |
| AN1469 | Identity Provider |
Enterprise |
DET0531
|
Addition of credentials (keys, app passwords, x.509 certs) to existing cloud accounts, service principals, or OAuth apps via portal or API by non-standard identities or IP ranges. |
| AN1470 | IaaS |
Enterprise |
DET0531
|
Cloud API usage to create/import SSH keys or generate new access keys (CreateAccessKey, ImportKeyPair, CreateLoginProfile) from non-console access or unusual principals. |
| AN1471 | SaaS |
Enterprise |
DET0531
|
Credential-related configuration changes in productivity apps, such as API key creation in Google Workspace, app tokens in Slack, or user-level OAuth credentials in M365. |
| AN1472 | Windows |
Enterprise |
DET0532
|
Detects behavioral sequence where an adversary gains elevated privileges and clears event logs using native binaries (e.g., wevtutil), PowerShell, or direct file deletion of .evtx files. |
| AN1473 | SaaS |
Enterprise |
DET0533
|
Detects anomalous CI/CD workflow execution originating from forked repositories, with pull request (PR) metadata or commit messages containing suspicious patterns (e.g., encoded payloads), coupled with the use of insecure pipeline triggers like |
| AN1474 | macOS |
Enterprise |
DET0534
|
Unauthorized modification of TCC.db followed by elevated process execution under a trusted parent (e.g., Finder, SystemUIServer) or via launchctl environment override. Also includes identification of SIP being disabled, which is highly uncommon and a prerequisite for this abuse path. |
| AN1475 | ESXi |
Enterprise |
DET0535
|
Malicious VIB installation for persistence via |
| AN1476 | Windows |
Enterprise |
DET0536
|
Detects anomalous wireless connections such as unexpected SSID associations, failed or repeated authentication attempts, and connections outside of known geofenced networks. Defenders should monitor wireless connection logs and event codes for network discovery, authentication, and association events. |
| AN1477 | Linux |
Enterprise |
DET0536
|
Detects unauthorized wireless associations by monitoring wpa_supplicant logs, NetworkManager events, and system calls related to interface state changes. Anomalies include repeated association failures, new SSIDs outside baselined values, and rogue AP connections. |
| AN1478 | macOS |
Enterprise |
DET0536
|
Detects unauthorized Wi-Fi associations and SSID scanning activity using unified logs and airport command telemetry. Anomalies include rapid SSID switching, connections to unapproved SSIDs, or repeated authentication failures. |
| AN1479 | Network Devices |
Enterprise |
DET0536
|
Detects rogue or suspicious wireless access attempts by monitoring firewall, WIDS/WIPS, and controller logs. Focus is on firewall rule changes, rogue AP detection, and anomalous MAC addresses connecting to access points. |
| AN1480 | Windows |
Enterprise |
DET0537
|
1) New or updated software is delivered/installed from atypical sources or with signature/hash mismatches; 2) installer/updater writes binaries to unexpected paths or replaces existing signed files; 3) first run causes unsigned/abnormally signed modules to load or child processes to execute, optionally followed by network egress to new destinations. |
| AN1481 | Linux |
Enterprise |
DET0537
|
1) Package manager or curl/wget installs/upgrades from non-approved repos or unsigned packages; 2) new ELF written into PATH directories or replacement of existing binaries/libraries; 3) first run leads to unexpected child processes or outbound connections. |
| AN1482 | macOS |
Enterprise |
DET0537
|
1) pkg/notarization installs from atypical sources or with Gatekeeper/AMFI warnings; 2) new Mach-O written into /Applications or ~/Library paths or substitution of signed components; 3) first run from installer spawns unsigned children or exfil. |
| AN1483 | Windows |
Enterprise |
DET0538
|
Processes such as plink.exe, ssh.exe, or netsh.exe establishing outbound network connections where traffic patterns show encapsulated protocols (e.g., RDP over SSH). Defender observations include anomalous process-to-network relationships, large asymmetric data flows, and port usage mismatches. |
| AN1484 | Linux |
Enterprise |
DET0538
|
sshd, socat, or custom binaries initiating port forwarding or encapsulating traffic (e.g., RDP, SMB) through SSH or HTTP. Defender sees abnormal connect/bind syscalls, encrypted traffic on ports typically used for non-encrypted services, and outlier traffic volume patterns. |
| AN1485 | macOS |
Enterprise |
DET0538
|
launchd or user-invoked processes (ssh, socat) encapsulating traffic via SSH tunnels, VPN-style tooling, or DNS-over-HTTPS clients. Defender sees outbound TLS traffic with embedded DNS or RDP payloads. |
| AN1486 | ESXi |
Enterprise |
DET0538
|
VMware daemons or user processes encapsulating traffic (e.g., guest VMs tunneling via hostd). Defender sees network services inside ESXi creating flows inconsistent with management plane traffic, such as SSH forwarding or DNS-over-HTTPS from management interfaces. |
| AN1487 | Office Suite |
Enterprise |
DET0539
|
Detects suspicious OAuth application integrations within Office 365 or Google Workspace environments, such as new app registrations, unexpected consent grants, or privilege assignments. Defenders should correlate between application creation/modification events and associated user or service principal activity to identify persistence via app integrations. |
| AN1488 | SaaS |
Enterprise |
DET0539
|
Detects anomalous SaaS application integration activity across environments such as Slack, Salesforce, or other enterprise SaaS services. Focus is on unauthorized app additions, unusual permission grants, and persistence through service principal tokens. |
| AN1489 | Windows |
Enterprise |
DET0540
|
Sustained execution of resource-intensive processes (e.g., cryptocurrency miners), often launched via scheduled tasks, WMI, or PowerShell. These processes frequently establish persistent external connections and attempt to evade detection using masqueraded or renamed binaries. |
| AN1490 | Linux |
Enterprise |
DET0540
|
Unusual long-running processes consuming high CPU cycles (e.g., via 'top' or 'ps') initiated via cron, shell scripts, or Docker. Connections to known mining pools or DNS over HTTPS usage as evasion. |
| AN1491 | macOS |
Enterprise |
DET0540
|
Persistent or background daemons (e.g., plist or launchd jobs) spawning high-CPU processes like xmrig or cpuminer. Outbound encrypted traffic to IPs/domains commonly used by mining proxies. |
| AN1492 | Containers |
Enterprise |
DET0540
|
Ephemeral or unauthorized container instantiation using public images (e.g., from DockerHub) that initiate high CPU usage shortly after startup. Often scheduled via Kubernetes or Docker socket abuse. |
| AN1493 | IaaS |
Enterprise |
DET0540
|
Unauthorized instance creation in unmonitored or unused regions. Burst of compute-intensive jobs in spot instances or sudden spike in resource usage in legitimate VMs. |
| AN1494 | Linux |
Enterprise |
DET0541
|
Detects adversary behavior where a process enumerates and modifies another process's memory using /proc/[pid]/maps and /proc/[pid]/mem files. This includes identifying gadgets via memory mappings and overwriting process memory via low-level file modification or dd usage. |
| AN1495 | Windows |
Enterprise |
DET0542
|
Monitor registry modifications to |
| AN1496 | Windows |
Enterprise |
DET0543
|
Processes not typically associated with encryption loading asymmetric crypto libraries (e.g., rsaenh.dll, crypt32.dll) and subsequently initiating outbound TLS/SSL connections with abnormal certificate chains or handshakes. Defender correlates process creation, module load, and unusual encrypted sessions. |
| AN1497 | Linux |
Enterprise |
DET0543
|
Processes (e.g., bash, python, custom binaries) dynamically linking libcrypto/libssl for RSA key exchange, then creating external connections with abnormal certificate validation or handshake anomalies. Defender observes syscall traces and outbound asymmetric key exchanges from non-SSL-native processes. |
| AN1498 | macOS |
Enterprise |
DET0543
|
Applications or launchd services invoking RSA or public-key routines from the Security framework, followed by outbound SSL/TLS sessions with unrecognized certs or anomalous handshakes. Defender observes unified logs of API calls and suspicious network entropy. |
| AN1499 | ESXi |
Enterprise |
DET0543
|
VMware services (hostd, vpxa) unexpectedly negotiating asymmetric crypto sessions to external endpoints outside vCenter or update servers. Defender sees encrypted handshakes in logs inconsistent with baseline ESXi communication patterns. |
| AN1500 | Network Devices |
Enterprise |
DET0543
|
Encrypted sessions detected with asymmetric key exchange anomalies on non-standard ports or with invalid/malformed certs. Defender correlates NetFlow/IPFIX with IDS/IPS detecting RSA exchanges outside expected TLS flows. |
| AN1501 | Windows |
Enterprise |
DET0544
|
Detects adversary abuse of Transactional NTFS (TxF) and undocumented process loading mechanisms (e.g., NtCreateProcessEx) to create a hollowed process from an uncommitted, maliciously tainted file image in memory, later executed via NtCreateThreadEx. |
| AN1502 | IaaS |
Enterprise |
DET0545
|
Monitor for suspicious use of cloud-native administrative command services (e.g., AWS Systems Manager Run Command, Azure RunCommand, GCP OS Config) to execute code inside VMs. Detect anomalies such as commands/scripts executed by unexpected users, execution outside of maintenance windows, or commands initiated by service accounts not normally tied to administration. Correlate cloud control-plane activity logs with host-level execution (process creation, script execution) to validate if commands materialized inside the guest OS. |
| AN1503 | Identity Provider |
Enterprise |
DET0546
|
Detects anomalous authentication activity such as sign-ins from impossible geolocations or legacy protocols from high-privileged accounts. |
| AN1504 | IaaS |
Enterprise |
DET0546
|
Detects cloud account use for API calls that exceed normal scope, such as IAM changes or access to services never used before. |
| AN1505 | SaaS |
Enterprise |
DET0546
|
Detects unexpected access or usage of cloud productivity tools (e.g., downloading large numbers of files, creating external shares) by internal users. |
| AN1506 | Office Suite |
Enterprise |
DET0546
|
Detects login and usage patterns deviating from typical Microsoft 365 or Google Workspace user profiles. |
| AN1507 | Windows |
Enterprise |
DET0547
|
Installation of malicious IIS/Apache/SQL server modules that later execute command-line interpreters or establish outbound connections. |
| AN1508 | Linux |
Enterprise |
DET0547
|
Abuse of extensible server modules (e.g., Apache, Nginx, Tomcat) to load rogue plugins that initiate bash, connect to C2, or spawn reverse shells. |
| AN1509 | macOS |
Enterprise |
DET0547
|
Malicious use of webserver plugins (e.g., for nginx, PHP, Node.js) that execute AppleScript or open network sockets. |
| AN1510 | ESXi |
Enterprise |
DET0547
|
Use of ESXi web interface plugins or vSphere extensions to embed persistent malicious scripts or services. |
| AN1511 | Windows |
Enterprise |
DET0548
|
Processes that normally do not initiate network communications suddenly making outbound HTTPS connections with high outbound-to-inbound data ratios. Defender view: correlation between process creation logs (e.g., Word, Excel, PowerShell) and subsequent anomalous network traffic volumes toward common web services (Dropbox, Google Drive, OneDrive). |
| AN1512 | Linux |
Enterprise |
DET0548
|
Processes (tar, curl, python scripts) accessing large file sets and initiating outbound HTTPS POST requests with payload sizes inconsistent with baseline activity. Defender perspective: detect abnormal sequence of file archival followed by encrypted uploads to external web services. |
| AN1513 | macOS |
Enterprise |
DET0548
|
Office apps or scripts writing files followed by xattr manipulation (to evade quarantine) and subsequent HTTPS uploads. Defender perspective: anomalous file modification + outbound TLS traffic originating from non-networking apps (Word, Excel, Preview). |
| AN1514 | SaaS |
Enterprise |
DET0548
|
Abnormal API calls from user accounts invoking file upload endpoints outside normal baselines (M365, Google Drive, Box). Defender perspective: monitor unified audit logs for elevated frequency of Upload, Create, or Copy operations from compromised accounts. |
| AN1515 | ESXi |
Enterprise |
DET0548
|
ESXi guest OS or management interface processes establishing unexpected external HTTPS connections. Defender perspective: monitor vmx or hostd processes making outbound web requests with significant data transfer. |
| AN1516 | Windows |
Enterprise |
DET0549
|
A process (non-system or user-initiated) accesses private key files in user profile paths or system certificate stores followed by potential network connections or compression activity. |
| AN1517 | Linux |
Enterprise |
DET0549
|
User or script-based access to ~/.ssh or other directories containing private keys followed by unusual shell activity or network connections. |
| AN1518 | macOS |
Enterprise |
DET0549
|
Access to user private key directories (e.g., /Users/*/.ssh) via Terminal, scripting engines, or non-default processes. |
| AN1519 | Network Devices |
Enterprise |
DET0549
|
CLI-based export of private key material (e.g., 'crypto pki export') with anomalous user session or AAA role escalation. |
| AN1520 | SaaS |
Enterprise |
DET0550
|
Anomalous high-volume access to customer records in CRM software by a non-CRM admin user account, especially following initial authentication from a rare location or device. Behavior includes abnormal access to PII fields or data exports within a short time window. |
| AN1521 | Windows |
Enterprise |
DET0551
|
Series of authentication failures (Event ID 4625) targeting the same or similar user accounts over time from one or more remote IPs |
| AN1522 | Linux |
Enterprise |
DET0551
|
Repeated failed SSH login attempts followed by a possible success from the same remote host |
| AN1523 | macOS |
Enterprise |
DET0551
|
Series of failed logins from loginwindow or sshd with repeated usernames or password prompts |
| AN1524 | Identity Provider |
Enterprise |
DET0551
|
Multiple failed sign-in attempts from external sources across many users followed by success from the same IP |
| AN1525 | Network Devices |
Enterprise |
DET0551
|
Login attempt failures over SNMP, Telnet, or SSH interface, often reflected in logs or syslog events |
| AN1526 | SaaS |
Enterprise |
DET0551
|
Password guessing attempts against web-based apps (e.g., Dropbox, Google Workspace) reflected in API or sign-in logs |
| AN1527 | Windows |
Enterprise |
DET0552
|
Detects creation or modification of Windows Services through command-line tools (e.g., |
| AN1528 | Windows |
Enterprise |
DET0553
|
Detects the creation or execution of padded binary files (e.g., large size but minimal legitimate content) followed by process execution or lateral movement from the host. |
| AN1529 | Linux |
Enterprise |
DET0553
|
Detects abnormal creation of binary files with significant size that are subsequently executed or accessed by non-standard users. |
| AN1530 | macOS |
Enterprise |
DET0553
|
Monitors for anomalous binary files written to disk with padded size and subsequent execution by user or service context. |
| AN1531 | Windows |
Enterprise |
DET0554
|
Detection of non-interactive or suspicious processes accessing Bluetooth interfaces and transmitting outbound traffic following file access or staging activity. |
| AN1532 | Linux |
Enterprise |
DET0554
|
Use of hcitool, bluetoothctl, or rfcomm to initialize Bluetooth connection paired with recent file reads by the same user or session. |
| AN1533 | macOS |
Enterprise |
DET0554
|
Observation of |
| AN1534 | macOS |
Enterprise |
DET0555
|
Detection focuses on identifying unauthorized file creation or modification within |
| AN1535 | Windows |
Enterprise |
DET0556
|
MSBuild.exe is invoked outside expected developer/build contexts or with anomalous arguments (e.g., non-canonical paths, remote shares, Base64/obfuscated property values). Within a short window, it (a) spawns high-risk LOLBins/script interpreters, (b) writes new PE/DLL/script artifacts into user-writable paths and executes them, (c) loads unsigned/user-writable modules, (d) performs memory injection/thread creation into other processes, and/or (e) initiates outbound network connections. |
| AN1536 | Windows |
Enterprise |
DET0557
|
Registry key modification to AppInit_DLLs value followed by anomalous DLL loading by processes importing user32.dll, especially unsigned or uncommon DLLs, suggesting unauthorized AppInit persistence or privilege escalation. |
| AN1537 | ESXi |
Enterprise |
DET0558
|
Detects suspicious use of ESXi native CLI tools like esxcli and vim-cmd by unauthorized users or outside expected maintenance windows. Focus is on actions such as stopping VMs, reconfiguring network/firewall settings, and enabling SSH or logging. |
| AN1538 | Windows |
Enterprise |
DET0559
|
Correlate process execution of shutdown/reboot commands (e.g., shutdown.exe, restart-computer) with host status change logs (Event IDs 1074, 6006) and absence of related administrative context (e.g., user not in Helpdesk group). |
| AN1539 | Linux |
Enterprise |
DET0559
|
Detect 'shutdown', 'reboot', or 'systemctl poweroff' executions with auditd/syslog and absence of scheduled maintenance windows or approved user context. |
| AN1540 | macOS |
Enterprise |
DET0559
|
Identify use of 'shutdown', 'reboot', or 'osascript' system shutdown invocations within unified logs and track unexpected shutdown sequences initiated by GUI or script. Cross-reference with user activity or absence thereof. |
| AN1541 | ESXi |
Enterprise |
DET0559
|
Detect commands such as 'esxcli system shutdown' or 'vim-cmd vmsvc/power.shutdown' executed outside of maintenance windows or via unusual users. Reboot logs in hostd.log and shell logs should be correlated. |
| AN1542 | Network Devices |
Enterprise |
DET0559
|
Monitor CLI 'reload' commands issued without scheduled maintenance, and correlate to TACACS+/AAA logs for privilege validation. |
| AN1543 | Windows |
Enterprise |
DET0560
|
Detection of compromised or misused valid accounts via anomalous logon patterns, abnormal logon types, and inconsistent geographic or time-based activity across Windows endpoints. |
| AN1544 | Linux |
Enterprise |
DET0560
|
Detection of valid account misuse through SSH logins, sudo/su abuse, and service account anomalies outside expected patterns. |
| AN1545 | macOS |
Enterprise |
DET0560
|
Detection of interactive and remote logins by service accounts or users at unusual times, with unexpected child process activity. |
| AN1546 | Identity Provider |
Enterprise |
DET0560
|
Detection of valid account abuse in IdP logs via geographic anomalies, impossible travel, risky sign-ins, and multiple MFA attempts or failures. |
| AN1547 | Containers |
Enterprise |
DET0560
|
Detection of containerized service accounts or compromised kubeconfigs being used for cluster access from unexpected nodes or IPs. |
| AN1548 | Windows |
Enterprise |
DET0561
|
Adversary installs or side-loads an IDE extension (VS Code, IntelliJ/JetBrains, Eclipse) or enables IDE tunneling. Chain: (1) IDE binary starts on a non-developer endpoint or server, often with install/force/tunnel flags → (2) extension files/registrations appear under user profile → (3) browser/IDE initiates outbound connections to extension marketplaces, update endpoints, or IDE remote/tunnel services → (4) optional child tools (ssh, node, powershell) execute under the IDE context. |
| AN1549 | Linux |
Enterprise |
DET0561
|
Adversary installs or abuses IDE extensions via CLI or direct write to profile directories and then communicates with marketplaces or remote tunnel services. Chain: auditd execve (code/idea/eclipse) with install/update flags or writes under ~/.vscode/extensions, ~/.config/JetBrains → outbound flows to .visualstudio.com, marketplace.visualstudio.com, .jetbrains.com, githubusercontent.com, or SSH/WebSocket tunnel endpoints → optional ssh/node processes spawned by IDE. |
| AN1550 | macOS |
Enterprise |
DET0561
|
Adversary adds IDE extensions or plugins (VS Code, JetBrains Toolbox/EAP, Eclipse) via GUI or CLI, possibly via managed profiles. Chain: process start with install/update flags → plist/extension folder changes under ~/Library/Application Support/Code or ~/Library/Application Support/JetBrains → outbound connections to marketplaces/tunnel services → optional helper (ssh/node) spawned. |
| AN1551 | Windows |
Enterprise |
DET0562
|
Windows environmental validation behavioral chain: (1) Rapid system discovery reconnaissance through WMI queries, registry enumeration, and network share discovery, (2) Environment-specific artifact collection (hostname, domain, IP addresses, installed software, hardware identifiers), (3) Cryptographic operations or conditional logic based on collected environmental values, (4) Selective payload execution contingent on environmental validation results, (5) Temporal correlation between discovery activities and subsequent execution or network communication |
| AN1552 | Linux |
Enterprise |
DET0562
|
Linux environmental validation behavioral chain: (1) Intensive system enumeration through command execution (uname, hostname, ifconfig, lsblk, mount), (2) File system reconnaissance targeting specific paths, network configurations, and installed packages, (3) Process and user enumeration to validate target environment characteristics, (4) Conditional script execution or binary activation based on environmental criteria, (5) Network connectivity validation and external IP address resolution for geolocation verification |
| AN1553 | macOS |
Enterprise |
DET0562
|
macOS environmental validation behavioral chain: (1) System profiling through system_profiler, sysctl, and hardware discovery commands, (2) Network interface and configuration enumeration for geolocation and network environment validation, (3) Application installation and version discovery for software environment fingerprinting, (4) Security feature detection (SIP, Gatekeeper, XProtect status), (5) Conditional payload execution based on macOS-specific environmental criteria and System Integrity Protection bypass validation |
| AN1554 | ESXi |
Enterprise |
DET0562
|
ESXi hypervisor environmental validation behavioral chain: (1) Virtual machine inventory and configuration enumeration through vim-cmd and esxcli commands, (2) Host hardware and network configuration discovery for hypervisor environment validation, (3) Datastore and storage configuration reconnaissance, (4) vCenter connectivity and cluster membership validation, (5) Selective malware deployment based on virtualization infrastructure characteristics and target VM validation |
| AN1555 | Linux |
Enterprise |
DET0563
|
Detection of environment variable tampering (HISTFILE, HISTCONTROL, HISTFILESIZE) and absence of expected bash history writes. Correlation of unset or zeroed history variables with active shell sessions is indicative of adversarial evasion. |
| AN1556 | macOS |
Enterprise |
DET0563
|
Detection of bash/zsh history suppression via HISTFILE/HISTCONTROL manipulation and absence of ~/.bash_history updates. Observing environment variable changes tied to terminal processes is a strong indicator. |
| AN1557 | Windows |
Enterprise |
DET0563
|
Detection of PowerShell history suppression using Set-PSReadLineOption with SaveNothing or altered HistorySavePath. Correlating these options with PowerShell usage highlights adversarial evasion attempts. |
| AN1558 | ESXi |
Enterprise |
DET0563
|
Detection of unset HISTFILE or modified history variables in ESXi shell sessions. Correlation of suspicious shell sessions with no recorded commands despite active usage. |
| AN1559 | Network Devices |
Enterprise |
DET0563
|
Detection of CLI commands that disable history logging such as 'no logging'. Anomalous lack of new commands in session logs while activity persists is a strong signal. |
| AN1560 | Windows |
Enterprise |
DET0564
|
Processes executing binaries named after legitimate system utilities (e.g., net.exe, findstr.exe, python.exe) from non-standard or application-specific directories, combined with file creation or modification events for such binaries. Defender correlates file writes in vulnerable directories, process execution paths inconsistent with baseline system paths, and abnormal parent-child relationships in process lineage. |
| AN1561 | Windows |
Enterprise |
DET0565
|
Registry access to system language keys (e.g., HKLM\SYSTEM\CurrentControlSet\Control\Nls\Language) or suspicious processes invoking locale-related APIs (e.g., GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList). Defender visibility focuses on anomalous or non-standard processes issuing these queries, especially when run by unknown binaries or scripts. |
| AN1562 | Linux |
Enterprise |
DET0565
|
Processes executing commands to query system locale and language settings, such as 'locale', 'echo $LANG', or parsing environment variables. Suspicious activity is indicated by these commands being run by unusual users, automation scripts, or non-administrative processes. |
| AN1563 | macOS |
Enterprise |
DET0565
|
Execution of commands to query system locale and language settings, such as 'defaults read -g AppleLocale' or 'systemsetup -gettimezone'. Unusual parent processes or execution contexts of these commands may indicate adversarial discovery. |
| AN1564 | Windows |
Enterprise |
DET0566
|
Detection of Office or document viewer processes (e.g., winword.exe) initiating network connections to remote templates or executing scripts due to manipulated template references (e.g., embedded in .docx, .rtf, or .dotm files), followed by suspicious child process creation (e.g., PowerShell). |
| AN1565 | SaaS |
Enterprise |
DET0567
|
Atypical access to Slack or Teams conversations via APIs, automation tokens, or bulk message export functionality, particularly after an account takeover or rare sign-in pattern. Often includes mass retrieval of chat history, download of message content, or scraping of workspace/channel metadata. |
| AN1566 | Office Suite |
Enterprise |
DET0567
|
Suspicious access to Microsoft Teams chat messages via eDiscovery, Graph API, or export methods after rare or compromised sign-in. Often associated with excessive file access, sensitive content review, or anomaly from expected user behavior. |
| AN1567 | Windows |
Enterprise |
DET0568
|
Detects suspicious USB HID device enumeration and keystroke injection patterns, such as rapid sequences of input with no user context, scripts executed through simulated keystrokes, or rogue devices presenting themselves as keyboards. |
| AN1568 | Linux |
Enterprise |
DET0568
|
Detects USB HID device enumeration under |
| AN1569 | macOS |
Enterprise |
DET0568
|
Detects abnormal HID device enumeration via I/O Registry (ioreg -p IOUSB) and keystroke injection targeting AppleScript, osascript, or PowerShell equivalents. Defender correlates new USB device connections with rapid script execution. |
| AN1570 | Network Devices |
Enterprise |
DET0569
|
Defenders may observe adversary attempts to downgrade system images by monitoring for anomalous file transfers of OS image files (via TFTP, FTP, SCP), configuration changes pointing boot system variables to older image files, unexpected OS version strings after reboot, and checksum mismatches against approved baseline images. Suspicious chains include transfer of an older image, alteration of boot configuration, and reboot/reload of the device. Adversaries may also tamper with CLI output to disguise downgrade attempts, requiring independent validation of OS version and integrity. |
| AN1571 | Windows |
Enterprise |
DET0570
|
Unusual processes (e.g., powershell.exe, excel.exe) accessing large local files and subsequently initiating HTTPS POST requests to domains associated with cloud storage services (e.g., dropbox.com, drive.google.com, box.com). Defender perspective: correlation between file reads in sensitive directories and high outbound traffic volume to known storage APIs. |
| AN1572 | Linux |
Enterprise |
DET0570
|
Processes such as curl, wget, rclone, or custom scripts executing uploads to cloud storage endpoints. Defender perspective: detect chained events where tar/gzip is executed to compress files followed by HTTPS PUT/POST requests to known storage services. |
| AN1573 | macOS |
Enterprise |
DET0570
|
Applications or scripts invoking cloud storage APIs (Dropbox sync, iCloud, Google Drive client) in unexpected contexts. Defender perspective: detect sensitive file reads by non-standard applications followed by unusual encrypted uploads to external cloud storage domains. |
| AN1574 | ESXi |
Enterprise |
DET0570
|
Unusual ESXi processes (vmx, hostd) reading datastore files and generating outbound HTTPS traffic toward external cloud storage endpoints. Defender perspective: anomalous datastore activity followed by network transfers to Dropbox, AWS S3, or other storage services. |
| AN1575 | Windows |
Enterprise |
DET0571
|
Detects command-line or API-based creation/modification of Windows Services via |
| AN1576 | Linux |
Enterprise |
DET0571
|
Detects creation or modification of |
| AN1577 | macOS |
Enterprise |
DET0571
|
Detects creation or modification of |
| AN1578 | Containers |
Enterprise |
DET0571
|
Detects creation of new container system processes via |
| AN1579 | Containers |
Enterprise |
DET0572
|
Detects assignment of high-privilege roles to user or service accounts via Kubernetes RoleBinding or ClusterRoleBinding objects, especially outside of CI/CD automation or from unknown IPs. |
| AN1580 | IaaS |
Enterprise |
DET0573
|
Detects snapshot sharing, backup exports, or data object transfers from victim-owned cloud accounts to other cloud identities within the same provider (e.g., AWS, Azure) using snapshot sharing, S3 bucket policy updates, or SAS URI generation. |
| AN1581 | Office Suite |
Enterprise |
DET0573
|
Detects user activity that shares or syncs files with external domains via link generation, OneDrive external sharing, or file transfer actions involving non-whitelisted partner tenants. |
| AN1582 | SaaS |
Enterprise |
DET0573
|
Detects use of built-in SaaS sharing mechanisms to transfer ownership or share access of critical data to external tenants or untrusted users through API calls or link generation features. |
| AN1583 | Windows |
Enterprise |
DET0574
|
Execution of network enumeration utilities (e.g., net.exe, ping.exe, tracert.exe) in short succession, often chained with lateral movement tools or system enumeration commands. |
| AN1584 | Linux |
Enterprise |
DET0574
|
Use of bash scripts or interactive shells to issue sequential ping, arp, or traceroute commands to map remote hosts. |
| AN1585 | macOS |
Enterprise |
DET0574
|
Execution of built-in or AppleScript-based system enumeration via |
| AN1586 | ESXi |
Enterprise |
DET0574
|
ESXi shell or SSH access issuing |
| AN1587 | Network Devices |
Enterprise |
DET0574
|
Execution of discovery commands like |
| AN1588 | Windows |
Enterprise |
DET0575
|
Detection focuses on monitoring registry modifications under HKLM\SOFTWARE\Microsoft\Netsh that indicate the addition of helper DLLs, followed by anomalous child process activity or module load behavior initiated by netsh.exe. These behaviors are rarely legitimate and may represent an adversary establishing persistence. |
| AN1589 | Windows |
Enterprise |
DET0576
|
Creation of inbox rules via PowerShell (New-InboxRule) or transport rules using Exchange cmdlets. Correlates user behavior, cmdlet usage, and rule properties. |
| AN1590 | macOS |
Enterprise |
DET0576
|
Creation or modification of Apple Mail rules by accessing plist files or GUI automation (AppleScript). |
| AN1591 | Office Suite |
Enterprise |
DET0576
|
Creation of email forwarding/redirect rules in Exchange Online via New-InboxRule or transport rule cmdlets, including auto-forwarding address field usage. |
| AN1592 | Linux |
Enterprise |
DET0576
|
Modification of Thunderbird message filters file or execution of CLI tools (e.g., formail/procmail) that alter .forward behavior. |
| AN1593 | Windows |
Enterprise |
DET0577
|
Unexpected modification of the KernelCallbackTable in a process’s PEB followed by invocation of modified callback functions (e.g., fnCOPYDATA) through Windows messages. Defender observes suspicious API call chains such as NtQueryInformationProcess → WriteProcessMemory → abnormal GUI callback execution, often correlating to anomalous process behavior such as network activity or code injection. |
| AN1594 | IaaS |
Enterprise |
DET0578
|
Detection of suspicious enumeration of cloud storage objects via API calls such as AWS S3 ListObjectsV2, Azure List Blobs, or GCP ListObjects. Correlate access with account role, user context, and prior authentication activity to identify anomalous usage patterns (e.g., unusual account, unexpected regions, or large-scale enumeration in short time windows). |
| AN1595 | Windows |
Enterprise |
DET0579
|
Monitor for suspicious usage of driver enumeration utilities (driverquery.exe) or API calls such as EnumDeviceDrivers(). Registry queries against HKLM\SYSTEM\CurrentControlSet\Services and HardwareProfiles that are abnormal may also indicate attempts to discover installed drivers and services. Correlate command execution, process creation, and registry access to build a behavioral chain of driver discovery. |
| AN1596 | Linux |
Enterprise |
DET0579
|
Detect attempts to enumerate kernel modules through lsmod, modinfo, or inspection of /proc/modules and /dev entries. Focus on unusual execution contexts such as unprivileged users or processes outside expected administrative workflows. |
| AN1597 | macOS |
Enterprise |
DET0579
|
Detect loading or inspection of kernel extensions (kextstat, kextfind) and file access to /System/Library/Extensions/. Monitor unexpected usage of these utilities by non-administrative users or scripts. |
| AN1598 | Windows |
Enterprise |
DET0580
|
Detects registration of new or modified network provider DLLs via registry changes, anomalous file creation of DLLs in system directories, and suspicious process activity (mpnotify.exe interacting with non-standard DLLs). Multi-event correlation ties registry modification events to subsequent DLL loads during user logon activity. |
| AN1599 | Windows |
Enterprise |
DET0581
|
Suspicious process initiating outbound connections to web services without corresponding response or return traffic, indicative of one-way command channels. |
| AN1600 | Linux |
Enterprise |
DET0581
|
Curl, wget, or custom HTTP clients initiated by uncommon user accounts or cron jobs to popular web services, with no observed response parsing logic. |
| AN1601 | macOS |
Enterprise |
DET0581
|
Process using URLSession or similar API to fetch from web services without any response handling, indicative of one-way C2 channels. |
| AN1602 | ESXi |
Enterprise |
DET0581
|
ESXi shell or scheduled tasks initiating outbound HTTPS to known public services without inbound return or loggable response, used to fetch instructions. |
| AN1603 | Network Devices |
Enterprise |
DET0582
|
Detection of unauthorized changes to boot configurations pointing to TFTP servers, unusual firmware loads during netbooting, or suspicious TFTP traffic. Correlation of boot config modifications, command history logs, and unexpected system image hashes provides detection coverage for adversaries attempting to persist via malicious TFTP boot images. |
| AN1604 | Windows |
Enterprise |
DET0583
|
Adversary uses built-in OS tools or API calls to create local or domain accounts for persistence or lateral movement. Tools such as 'net user', PowerShell, or MMC snap-ins may be used. Detection focuses on Event ID 4720 paired with process lineage and user context. |
| AN1605 | Linux |
Enterprise |
DET0583
|
Adversary invokes 'useradd', 'adduser', or equivalent system commands or scripts to create local users. Detection focuses on command execution and audit trail of passwd/shadow file modifications. |
| AN1606 | macOS |
Enterprise |
DET0583
|
Adversary creates new users using 'dscl' commands, GUI tools, or by modifying user plist files. Detection includes monitoring dscl invocation and user-related plist changes. |
| AN1607 | Identity Provider |
Enterprise |
DET0583
|
Adversary creates users via IAM/IdP API or portal (e.g., Azure AD, Okta). Detection involves monitoring API calls, admin action logs, and correlation with role assignments. |
| AN1608 | IaaS |
Enterprise |
DET0583
|
Account creation via cloud service APIs or CLI, often associated with key generation. Monitored via CloudTrail or equivalent audit logs. |
| AN1609 | macOS |
Enterprise |
DET0584
|
Unexpected creation or modification of files with |
| AN1610 | Windows |
Enterprise |
DET0585
|
Abuse of JamPlus.exe to launch malicious payloads via crafted .jam files, resulting in abnormal process creation, command execution, or artifact generation outside of standard development workflows. |
| AN1611 | Windows |
Enterprise |
DET0586
|
Detects credential dumping attempts targeting the NTDS.dit database by monitoring shadow copy creation, suspicious file access to %SystemRoot%\NTDS\ntds.dit, and the use of tooling like ntdsutil.exe or volume management APIs. |
| AN1612 | Windows |
Enterprise |
DET0587
|
Detection of suspicious enumeration of local or domain accounts via command-line tools, WMI, or scripts. |
| AN1613 | Linux |
Enterprise |
DET0587
|
Enumeration of users and groups through suspicious shell commands or unauthorized access to /etc/passwd or /etc/shadow. |
| AN1614 | macOS |
Enterprise |
DET0587
|
Detection of user account enumeration through tools like dscl, dscacheutil, or loginshell enumeration via command-line. |
| AN1615 | IaaS |
Enterprise |
DET0587
|
Detection of API calls listing users, IAM roles, or groups in cloud environments. |
| AN1616 | Identity Provider |
Enterprise |
DET0587
|
Enumeration of user or role objects via IdP API endpoints or LDAP queries. |
| AN1617 | ESXi |
Enterprise |
DET0587
|
Account enumeration via esxcli, vim-cmd, or API calls to vSphere. |
| AN1618 | SaaS |
Enterprise |
DET0587
|
Account enumeration via bulk access to user directory features or hidden APIs. |
| AN1619 | Office Suite |
Enterprise |
DET0587
|
Account discovery via VBA macros, COM objects, or embedded scripting. |
| AN1620 | Windows |
Enterprise |
DET0588
|
Detection of suspicious use of |
| AN1621 | Windows |
Enterprise |
DET0589
|
Detects enabling of reversible password encryption in Active Directory or Group Policy, suspicious PowerShell commands modifying AD user properties, and unusual account configuration changes correlated with policy modifications. Multi-event correlation links Group Policy edits, PowerShell command execution, and user account property changes to identify tampering with authentication encryption settings. |
| AN1622 | Windows |
Enterprise |
DET0590
|
Adversary modifies externally-facing web content by accessing and overwriting hosted HTML/JS/CSS files, typically following web shell deployment, credential abuse, or exploitation of web application vulnerabilities. |
| AN1623 | Linux |
Enterprise |
DET0590
|
Adversary compromises a Linux-based web server and modifies hosted web files by exploiting upload vulnerabilities, remote code execution, or replacing index.html via SSH/webshell. |
| AN1624 | macOS |
Enterprise |
DET0590
|
Adversary modifies web-facing content on macOS via web development environments like MAMP or misconfigured Apache instances, typically with access to the hosting user account or via persistence tools. |
| AN1625 | IaaS |
Enterprise |
DET0590
|
Adversary modifies content in cloud-hosted websites (e.g., AWS S3-backed, Azure Blob-hosted sites) by gaining access to management consoles or APIs and uploading altered HTML/JS files. |
| AN1626 | Windows |
Enterprise |
DET0591
|
Detects attempts to modify file timestamps via API usage (e.g., |
| AN1627 | Linux |
Enterprise |
DET0591
|
Detects use of timestamp-altering commands like |
| AN1628 | macOS |
Enterprise |
DET0591
|
Detects timestamp changes using |
| AN1629 | ESXi |
Enterprise |
DET0591
|
Detects abuse of busybox commands (e.g., |
| AN1630 | Network Devices |
Enterprise |
DET0592
|
Defenders may observe adversary attempts to extract configuration data from management repositories by monitoring for anomalous SNMP queries, API calls, or protocol requests (e.g., NETCONF, RESTCONF) that enumerate system configuration. Suspicious sequences include repeated queries from untrusted IPs, abnormal query types requesting sensitive configuration data, or repository access occurring outside of normal administrative maintenance windows. Abnormal authentication attempts, sudden enumeration of device inventory, or bulk data transfer of configuration files may also be observed. |
| AN1631 | Linux |
Enterprise |
DET0593
|
Monitoring adversary access to sensitive process memory via the /proc filesystem to extract credential material, often involving multi-step access to /proc/[pid]/mem or /proc/[pid]/maps combined with privilege escalation or credential scraping binaries. |
| AN1632 | Windows |
Enterprise |
DET0594
|
Detects unauthorized invocation of replication operations (DCSync) via Directory Replication Service (DRS), often executed by threat actors using Mimikatz or similar tools from non-DC endpoints. |
| AN1633 | Windows |
Enterprise |
DET0595
|
Detects exploitation attempts targeting defensive security software or OS services. Defender observation includes abnormal process behavior (e.g., AV or EDR crashing unexpectedly), unsigned/untrusted modules loaded into defensive processes, or privilege escalation from security agent services. Multi-event correlation ties exploitation attempts to subsequent evasive behavior like service termination or missing logs. |
| AN1634 | Linux |
Enterprise |
DET0595
|
Detects kernel- or user-space exploitation attempts targeting auditd, AV daemons, or security monitoring agents. Defender observation includes unexpected segfaults, privilege escalation attempts from low-privileged processes, or modifications to security binaries. Correlates exploitation attempts with subsequent gaps in logging or terminated processes. |
| AN1635 | macOS |
Enterprise |
DET0595
|
Detects exploitation of macOS security and integrity services, such as Gatekeeper, XProtect, or EDR agents. Defender observations include unsigned processes attempting privileged operations, abnormal termination of security daemons, or modification of system integrity logs. |
| AN1636 | IaaS |
Enterprise |
DET0595
|
Detects exploitation of IaaS cloud security boundaries to evade defense controls. Defender perspective includes anomalous API calls that bypass audit logging, disable monitoring, or manipulate guardrails (e.g., CloudTrail tampering). Correlation highlights when exploitation attempts precede sudden absence of expected telemetry. |
| AN1637 | SaaS |
Enterprise |
DET0595
|
Detects adversary abuse of SaaS platform vulnerabilities to bypass logging, monitoring, or consent boundaries. Defender perspective focuses on abnormal application integration events, missing audit logs, or API calls from unauthorized service principals that align with exploitation attempts. |
| AN1638 | Linux |
Enterprise |
DET0596
|
SSH login from a remote system (via sshd), followed by user context execution of suspicious binaries or privilege escalation behavior. |
| AN1639 | macOS |
Enterprise |
DET0596
|
SSH login detected via Unified Logs, followed by unusual process execution, especially outside normal user behavior patterns. |
| AN1640 | ESXi |
Enterprise |
DET0596
|
SSH login via hostd or |
| AN1641 | Windows |
Enterprise |
DET0597
|
Detection of suspicious access to password manager processes (KeePass, 1Password, LastPass, Bitwarden) through abnormal process injection, memory reads, or command-line usage of vault-related DLLs. Correlates process creation with OS API calls and file access to vault databases (.kdbx, .opvault, .ldb). |
| AN1642 | Linux |
Enterprise |
DET0597
|
Suspicious access to password manager vaults (KeePassXC, gnome-keyring, pass) via memory scraping or unauthorized file reads. Detects unusual command execution involving gdb/strace attached to password manager processes. |
| AN1643 | macOS |
Enterprise |
DET0597
|
Detection of password manager database access (1Password .opvault, LastPass caches, KeePass .kdbx) outside expected parent processes. Identifies memory scraping attempts via suspicious API calls or tools attaching to password manager processes. |
| AN1644 | Android |
Mobile |
DET0598
|
Application vetting services may detect API calls to |
| AN1645 | Android |
Mobile |
DET0599
|
The user can view the default SMS handler in system settings. |
| AN1646 | Android |
Mobile |
DET0600
|
Application vetting services could look for the Android permission |
| AN1647 | iOS |
Mobile |
DET0600
|
Application vetting services could look for the Android permission |
| AN1648 | Android |
Mobile |
DET0601
|
System information discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1649 | iOS |
Mobile |
DET0601
|
System information discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1650 | Android |
Mobile |
DET0602
|
Application vetting services could look for |
| AN1651 | iOS |
Mobile |
DET0602
|
Application vetting services could look for |
| AN1652 | Android |
Mobile |
DET0603
|
The user can view a list of device administrators in device settings and revoke permission where appropriate. Applications that request device administrator permissions should be scrutinized further for malicious behavior. |
| AN1653 | Android |
Mobile |
DET0604
|
Integrity checking mechanisms can potentially detect unauthorized hardware modifications. |
| AN1654 | iOS |
Mobile |
DET0604
|
Integrity checking mechanisms can potentially detect unauthorized hardware modifications. |
| AN1655 | Android |
Mobile |
DET0605
|
Application vetting services could closely scrutinize applications that request Device Administrator permissions. |
| AN1656 | Android |
Mobile |
DET0606
|
The user can view a list of device administrators and applications that have registered Accessibility services in device settings. Applications that register an Accessibility service or request device administrator permissions should be scrutinized further for malicious behavior. |
| AN1657 | Android |
Mobile |
DET0607
|
Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells. |
| AN1658 | iOS |
Mobile |
DET0607
|
Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells. |
| AN1659 | Android |
Mobile |
DET0608
|
On Android, the user can review which applications can use premium SMS features in the "Special access" page within application settings. |
| AN1660 | iOS |
Mobile |
DET0608
|
On Android, the user can review which applications can use premium SMS features in the "Special access" page within application settings. |
| AN1661 | Android |
Mobile |
DET0609
|
Unexpected behavior from an application could be an indicator of masquerading. |
| AN1662 | iOS |
Mobile |
DET0609
|
Unexpected behavior from an application could be an indicator of masquerading. |
| AN1663 | Android |
Mobile |
DET0610
|
Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. |
| AN1664 | iOS |
Mobile |
DET0610
|
Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. |
| AN1665 | Android |
Mobile |
DET0611
|
The user can also inspect and modify the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access). |
| AN1666 | Android |
Mobile |
DET0612
|
The user can view applications that have registered accessibility services in the accessibility menu within the device settings. |
| AN1667 | Android |
Mobile |
DET0613
|
Monitor for pseudo-randomly generated domain names based on frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more. Additionally, check if the suspicious domain has been recently registered, if it has been rarely visited, or if the domain had a spike in activity after being dormant. Content delivery network (CDN) domains may trigger these detections due to the format of their domain names. |
| AN1668 | iOS |
Mobile |
DET0613
|
Monitor for pseudo-randomly generated domain names based on frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more. Additionally, check if the suspicious domain has been recently registered, if it has been rarely visited, or if the domain had a spike in activity after being dormant. Content delivery network (CDN) domains may trigger these detections due to the format of their domain names. |
| AN1669 | Android |
Mobile |
DET0614
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1670 | iOS |
Mobile |
DET0614
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1671 | Android |
Mobile |
DET0615
|
Exfiltration Over C2 Channel can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1672 | iOS |
Mobile |
DET0615
|
Exfiltration Over C2 Channel can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1673 | Android |
Mobile |
DET0616
|
Application vetting services could look for applications attempting to get |
| AN1674 | iOS |
Mobile |
DET0616
|
Application vetting services could look for applications attempting to get |
| AN1675 | Android |
Mobile |
DET0617
|
Many properly configured firewalls may naturally block command and control traffic. |
| AN1676 | iOS |
Mobile |
DET0617
|
Many properly configured firewalls may naturally block command and control traffic. |
| AN1677 | Android |
Mobile |
DET0618
|
Application vetting services may be able to list domains and/or IP addresses that applications communicate with. |
| AN1678 | iOS |
Mobile |
DET0618
|
Application vetting services may be able to list domains and/or IP addresses that applications communicate with. |
| AN1679 | Android |
Mobile |
DET0619
|
On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications. On iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies. |
| AN1680 | iOS |
Mobile |
DET0619
|
On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications. On iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies. |
| AN1681 | Android |
Mobile |
DET0620
|
Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1682 | iOS |
Mobile |
DET0620
|
Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1683 | Android |
Mobile |
DET0621
|
Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage. |
| AN1684 | iOS |
Mobile |
DET0621
|
Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage. |
| AN1685 | Android |
Mobile |
DET0622
|
Application vetting services could look for misuse of dynamic libraries. |
| AN1686 | iOS |
Mobile |
DET0622
|
Application vetting services could look for misuse of dynamic libraries. |
| AN1687 | Android |
Mobile |
DET0623
|
Mobile security products can potentially detect rogue Wi-Fi access points if the adversary is attempting to decrypt traffic using an untrusted SSL certificate. |
| AN1688 | iOS |
Mobile |
DET0623
|
Mobile security products can potentially detect rogue Wi-Fi access points if the adversary is attempting to decrypt traffic using an untrusted SSL certificate. |
| AN1689 | Android |
Mobile |
DET0624
|
Remote access software typically requires many privileged permissions, such as accessibility services or device administrator. |
| AN1690 | iOS |
Mobile |
DET0624
|
Remote access software typically requires many privileged permissions, such as accessibility services or device administrator. |
| AN1691 | Android |
Mobile |
DET0625
|
Application vetting services could look for applications attempting to get |
| AN1692 | iOS |
Mobile |
DET0625
|
Application vetting services could look for applications attempting to get |
| AN1693 | Android |
Mobile |
DET0626
|
When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. |
| AN1694 | iOS |
Mobile |
DET0626
|
When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. |
| AN1695 | Android |
Mobile |
DET0627
|
On Android, the user can review which applications have Device Administrator access in the device settings and revoke permission where appropriate. |
| AN1696 | iOS |
Mobile |
DET0627
|
On Android, the user can review which applications have Device Administrator access in the device settings and revoke permission where appropriate. |
| AN1697 | Android |
Mobile |
DET0628
|
Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries. |
| AN1698 | iOS |
Mobile |
DET0628
|
Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries. |
| AN1699 | Android |
Mobile |
DET0629
|
Network traffic analysis may reveal processes communicating with malicious domains. |
| AN1700 | iOS |
Mobile |
DET0629
|
Network traffic analysis may reveal processes communicating with malicious domains. |
| AN1701 | Android |
Mobile |
DET0630
|
The user is prompted for approval when an application requests device administrator permissions. |
| AN1702 | Android |
Mobile |
DET0631
|
Enterprises may be able to detect anomalous traffic originating from mobile devices, which could indicate compromise. |
| AN1703 | Android |
Mobile |
DET0632
|
Application vetting services could look for misuse of dynamic libraries. |
| AN1704 | iOS |
Mobile |
DET0632
|
Application vetting services could look for misuse of dynamic libraries. |
| AN1705 | iOS |
Mobile |
DET0633
|
Application vetting services may be able to detect known privilege escalation exploits contained within applications, as well as searching application packages for strings that correlate to known password store locations. |
| AN1706 | Android |
Mobile |
DET0634
|
Application vetting services could look for usage of the |
| AN1707 | iOS |
Mobile |
DET0634
|
Application vetting services could look for usage of the |
| AN1708 | Android |
Mobile |
DET0635
|
Monitor for API calls that are related to the AccountManager API on Android and Keychain services on iOS. |
| AN1709 | iOS |
Mobile |
DET0635
|
Monitor for API calls that are related to the AccountManager API on Android and Keychain services on iOS. |
| AN1710 | Android |
Mobile |
DET0636
|
System Network Connections Discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1711 | Android |
Mobile |
DET0637
|
The user can see persistent notifications in their notification drawer and can subsequently uninstall applications that do not belong. |
| AN1712 | Android |
Mobile |
DET0638
|
Mobile security products can detect which applications can request device administrator permissions. Application vetting services could be extra scrutinous of applications that request device administrator permissions. |
| AN1713 | Android |
Mobile |
DET0639
|
Unexpected loss of radio signal could indicate that a device is being actively jammed. |
| AN1714 | iOS |
Mobile |
DET0639
|
Unexpected loss of radio signal could indicate that a device is being actively jammed. |
| AN1715 | Android |
Mobile |
DET0640
|
Application vetting services could potentially detect the usage of APIs intended for artifact hiding. |
| AN1716 | Android |
Mobile |
DET0641
|
Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user. |
| AN1717 | iOS |
Mobile |
DET0641
|
Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user. |
| AN1718 | Android |
Mobile |
DET0642
|
Application vetting services can detect when an application requests administrator permission. |
| AN1719 | Android |
Mobile |
DET0643
|
Application vetting services could detect usage of standard clipboard APIs. |
| AN1720 | iOS |
Mobile |
DET0643
|
Application vetting services could detect usage of standard clipboard APIs. |
| AN1721 | iOS |
Mobile |
DET0644
|
Application vetting services could look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because as legitimate software may use packing techniques to reduce binary size or to protect proprietary code. |
| AN1722 | Android |
Mobile |
DET0644
|
Application vetting services could look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because as legitimate software may use packing techniques to reduce binary size or to protect proprietary code. |
| AN1723 | Android |
Mobile |
DET0645
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1724 | iOS |
Mobile |
DET0645
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1725 | Android |
Mobile |
DET0646
|
Application vetting services can detect certificate pinning by examining an application’s |
| AN1726 | iOS |
Mobile |
DET0646
|
Application vetting services can detect certificate pinning by examining an application’s |
| AN1727 | Android |
Mobile |
DET0647
|
Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. |
| AN1728 | Android |
Mobile |
DET0648
|
Application vetting services can detect unnecessary and potentially abused location permissions. |
| AN1729 | iOS |
Mobile |
DET0648
|
Application vetting services can detect unnecessary and potentially abused location permissions. |
| AN1730 | Android |
Mobile |
DET0649
|
This behavior is seamless to the user and is typically undetectable. |
| AN1731 | Android |
Mobile |
DET0650
|
Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user. |
| AN1732 | iOS |
Mobile |
DET0650
|
Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user. |
| AN1733 | iOS |
Mobile |
DET0651
|
Mobile security products can detect which applications can request device administrator permissions. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity. |
| AN1734 | Android |
Mobile |
DET0651
|
Mobile security products can detect which applications can request device administrator permissions. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity. |
| AN1735 | Android |
Mobile |
DET0652
|
Application vetting services may detect when an application requests permissions after an application update. |
| AN1736 | iOS |
Mobile |
DET0652
|
Application vetting services may detect when an application requests permissions after an application update. |
| AN1737 | Android |
Mobile |
DET0653
|
The user can review which applications have location and sensitive phone information permissions in the operating system’s settings menu. |
| AN1738 | iOS |
Mobile |
DET0653
|
The user can review which applications have location and sensitive phone information permissions in the operating system’s settings menu. |
| AN1739 | Android |
Mobile |
DET0654
|
On Android, Verified Boot can detect unauthorized modifications to the system partition. Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. |
| AN1740 | iOS |
Mobile |
DET0654
|
On Android, Verified Boot can detect unauthorized modifications to the system partition. Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. |
| AN1741 | Android |
Mobile |
DET0655
|
Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells. |
| AN1742 | iOS |
Mobile |
DET0655
|
Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells. |
| AN1743 | Android |
Mobile |
DET0656
|
When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. |
| AN1744 | iOS |
Mobile |
DET0656
|
When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. |
| AN1745 | Android |
Mobile |
DET0657
|
On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications. On iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies. |
| AN1746 | iOS |
Mobile |
DET0657
|
On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications. On iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies. |
| AN1747 | Android |
Mobile |
DET0658
|
The OS may show a notification to the user that the SIM card has been transferred to another device. |
| AN1748 | iOS |
Mobile |
DET0658
|
The OS may show a notification to the user that the SIM card has been transferred to another device. |
| AN1749 | Android |
Mobile |
DET0659
|
No standard detection method currently exists for this technique. |
| AN1750 | Android |
Mobile |
DET0660
|
Application vetting services could look for use of standard APIs (e.g. the clipboard API) that could indicate data manipulation is occurring. |
| AN1751 | Android |
Mobile |
DET0661
|
Application vetting services can look for applications requesting the |
| AN1752 | iOS |
Mobile |
DET0661
|
Application vetting services can look for applications requesting the |
| AN1753 | Android |
Mobile |
DET0662
|
Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation. The CSRIC also suggests threat information sharing between telecommunications industry members. |
| AN1754 | iOS |
Mobile |
DET0662
|
Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation. The CSRIC also suggests threat information sharing between telecommunications industry members. |
| AN1755 | Android |
Mobile |
DET0663
|
Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. |
| AN1756 | iOS |
Mobile |
DET0663
|
Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. |
| AN1757 | iOS |
Mobile |
DET0664
|
Mobile security products can potentially detect jailbroken devices. |
| AN1758 | Android |
Mobile |
DET0665
|
Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken. |
| AN1759 | iOS |
Mobile |
DET0665
|
Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken. |
| AN1760 | Android |
Mobile |
DET0666
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1761 | iOS |
Mobile |
DET0666
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1762 | Android |
Mobile |
DET0667
|
Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user. |
| AN1763 | iOS |
Mobile |
DET0667
|
Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user. |
| AN1764 | Android |
Mobile |
DET0668
|
Application vetting services can look for the use of the Android |
| AN1765 | Android |
Mobile |
DET0669
|
Monitor for pseudo-randomly generated domain names based on frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more. Additionally, check if the suspicious domain has been recently registered, if it has been rarely visited, or if the domain had a spike in activity after being dormant. Content delivery network (CDN) domains may trigger these detections due to the format of their domain names. |
| AN1766 | iOS |
Mobile |
DET0669
|
Monitor for pseudo-randomly generated domain names based on frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more. Additionally, check if the suspicious domain has been recently registered, if it has been rarely visited, or if the domain had a spike in activity after being dormant. Content delivery network (CDN) domains may trigger these detections due to the format of their domain names. |
| AN1767 | Android |
Mobile |
DET0670
|
Many encryption mechanisms are built into standard application-accessible APIs and are therefore undetectable to the end user. |
| AN1768 | iOS |
Mobile |
DET0670
|
Many encryption mechanisms are built into standard application-accessible APIs and are therefore undetectable to the end user. |
| AN1769 | Android |
Mobile |
DET0671
|
The user may view applications with administrator access through the device settings and may also notice if user data is inexplicably missing. |
| AN1770 | Android |
Mobile |
DET0672
|
Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. |
| AN1771 | iOS |
Mobile |
DET0672
|
Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. |
| AN1772 | Android |
Mobile |
DET0673
|
In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators. In Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application. In both Android (6.0 and up) and iOS, the user can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. |
| AN1773 | iOS |
Mobile |
DET0673
|
In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators. In Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application. In both Android (6.0 and up) and iOS, the user can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. |
| AN1774 | Android |
Mobile |
DET0674
|
Application vetting services could look for |
| AN1775 | iOS |
Mobile |
DET0674
|
Application vetting services could look for |
| AN1776 | Android |
Mobile |
DET0675
|
In both Android (6.0 and up) and iOS, the user can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. |
| AN1777 | iOS |
Mobile |
DET0675
|
In both Android (6.0 and up) and iOS, the user can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. |
| AN1778 | Android |
Mobile |
DET0676
|
An Android user can view and manage which applications hold the |
| AN1779 | iOS |
Mobile |
DET0676
|
An Android user can view and manage which applications hold the |
| AN1780 | Android |
Mobile |
DET0677
|
Detection of steganography is difficult unless detectable artifacts with a known signature are left behind by the obfuscation process. Look for strings are other signatures left in system artifacts related to decoding steganography. |
| AN1781 | Android |
Mobile |
DET0678
|
Application vetting services may be able to detect if an application attempts to encrypt files, although this may be benign behavior. |
| AN1782 | Android |
Mobile |
DET0679
|
Application vetting services could look for |
| AN1783 | iOS |
Mobile |
DET0679
|
Application vetting services could look for |
| AN1784 | Android |
Mobile |
DET0680
|
Application vetting services could look for the Android permission |
| AN1785 | iOS |
Mobile |
DET0680
|
Application vetting services could look for the Android permission |
| AN1786 | Android |
Mobile |
DET0681
|
The user can view permissions granted to an application in device settings. |
| AN1787 | iOS |
Mobile |
DET0681
|
The user can view permissions granted to an application in device settings. |
| AN1788 | Android |
Mobile |
DET0682
|
On Android, the user is presented with a permissions popup when an application requests access to external device storage. |
| AN1789 | iOS |
Mobile |
DET0682
|
On Android, the user is presented with a permissions popup when an application requests access to external device storage. |
| AN1790 | Android |
Mobile |
DET0683
|
Applications could be vetted for their use of the clipboard manager APIs with extra scrutiny given to application that make use of them. |
| AN1791 | Android |
Mobile |
DET0684
|
Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious. |
| AN1792 | iOS |
Mobile |
DET0684
|
Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious. |
| AN1793 | Android |
Mobile |
DET0685
|
Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1794 | iOS |
Mobile |
DET0685
|
Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1795 | Android |
Mobile |
DET0686
|
Application vetting services could look for |
| AN1796 | iOS |
Mobile |
DET0686
|
Application vetting services could look for |
| AN1797 | Android |
Mobile |
DET0687
|
Application vetting can detect many techniques associated with impairing device defenses. |
| AN1798 | Android |
Mobile |
DET0688
|
If the user sees a notification with text they do not recognize, they should review their list of installed applications. |
| AN1799 | iOS |
Mobile |
DET0688
|
If the user sees a notification with text they do not recognize, they should review their list of installed applications. |
| AN1800 | Android |
Mobile |
DET0689
|
Mobile threat defense agents could detect unauthorized operating system modifications by using attestation. |
| AN1801 | Android |
Mobile |
DET0690
|
Application vetting services could look for use of the accessibility service or features that typically require root access. |
| AN1802 | Android |
Mobile |
DET0691
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1803 | iOS |
Mobile |
DET0691
|
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1804 | Android |
Mobile |
DET0692
|
Mobile security products can typically detect rooted devices, which is an indication that Process Discovery is possible. Application vetting could potentially detect when applications attempt to abuse root access or root the system itself. Further, application vetting services could look for attempted usage of legacy process discovery mechanisms, such as the usage of |
| AN1805 | iOS |
Mobile |
DET0692
|
Mobile security products can typically detect rooted devices, which is an indication that Process Discovery is possible. Application vetting could potentially detect when applications attempt to abuse root access or root the system itself. Further, application vetting services could look for attempted usage of legacy process discovery mechanisms, such as the usage of |
| AN1806 | Android |
Mobile |
DET0693
|
The user can view a list of active device administrators in the device settings. |
| AN1807 | Android |
Mobile |
DET0694
|
Mobile threat defense agents could detect unauthorized operating system modifications by using attestation. |
| AN1808 | Android |
Mobile |
DET0695
|
The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions. |
| AN1809 | iOS |
Mobile |
DET0695
|
The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions. |
| AN1810 | Android |
Mobile |
DET0696
|
Network service scanning can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1811 | iOS |
Mobile |
DET0696
|
Network service scanning can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1812 | Android |
Mobile |
DET0697
|
Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay. |
| AN1813 | Android |
Mobile |
DET0698
|
Exfiltration Over Alternative Protocols can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1814 | iOS |
Mobile |
DET0698
|
Exfiltration Over Alternative Protocols can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1815 | Android |
Mobile |
DET0699
|
Mobile security products may be able to detect some forms of user evasion. Otherwise, the act of hiding malicious activity could be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1816 | Android |
Mobile |
DET0700
|
Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. |
| AN1817 | iOS |
Mobile |
DET0700
|
Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. |
| AN1818 | Android |
Mobile |
DET0701
|
Exfiltration Over Unencrypted Non-C2 Protocols can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1819 | iOS |
Mobile |
DET0701
|
Exfiltration Over Unencrypted Non-C2 Protocols can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1820 | Android |
Mobile |
DET0702
|
Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity and alerts users when their credentials have been used on a new device. Apple iCloud also provides notifications to users of account activity such as when credentials have been used. |
| AN1821 | iOS |
Mobile |
DET0702
|
Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity and alerts users when their credentials have been used on a new device. Apple iCloud also provides notifications to users of account activity such as when credentials have been used. |
| AN1822 | Android |
Mobile |
DET0703
|
The user can review available call logs for irregularities, such as missing or unrecognized calls. |
| AN1823 | Android |
Mobile |
DET0704
|
Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries. |
| AN1824 | iOS |
Mobile |
DET0704
|
Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries. |
| AN1825 | Android |
Mobile |
DET0705
|
The user can view and manage installed third-party keyboards. |
| AN1826 | iOS |
Mobile |
DET0705
|
The user can view and manage installed third-party keyboards. |
| AN1827 | Android |
Mobile |
DET0706
|
Many properly configured firewalls may also naturally block command and control traffic over non-standard ports. |
| AN1828 | iOS |
Mobile |
DET0706
|
Many properly configured firewalls may also naturally block command and control traffic over non-standard ports. |
| AN1829 | Android |
Mobile |
DET0707
|
Scheduling tasks/jobs can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1830 | iOS |
Mobile |
DET0707
|
Scheduling tasks/jobs can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1831 | Android |
Mobile |
DET0708
|
Application vetting services could look for usage of the |
| AN1832 | iOS |
Mobile |
DET0708
|
Application vetting services could look for usage of the |
| AN1833 | Android |
Mobile |
DET0709
|
Application vetting services could look for usage of the |
| AN1834 | iOS |
Mobile |
DET0709
|
Application vetting services could look for usage of the |
| AN1835 | Android |
Mobile |
DET0710
|
Mobile security products can use attestation to detect compromised devices. |
| AN1836 | iOS |
Mobile |
DET0710
|
Mobile security products can use attestation to detect compromised devices. |
| AN1837 | Android |
Mobile |
DET0711
|
Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. |
| AN1838 | Android |
Mobile |
DET0712
|
Application vetting services could detect applications trying to modify files in protected parts of the operating system. |
| AN1839 | iOS |
Mobile |
DET0712
|
Application vetting services could detect applications trying to modify files in protected parts of the operating system. |
| AN1840 | Android |
Mobile |
DET0713
|
Accessing data from the local system can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1841 | iOS |
Mobile |
DET0713
|
Accessing data from the local system can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1842 | Android |
Mobile |
DET0714
|
The user can examine the list of all installed applications, including those with a suppressed icon, in the device settings. If the user is redirected to the device settings when tapping an application’s icon, they should inspect the application to ensure it is genuine. |
| AN1843 | Android |
Mobile |
DET0715
|
Unexpected behavior from an application could be an indicator of masquerading. |
| AN1844 | iOS |
Mobile |
DET0715
|
Unexpected behavior from an application could be an indicator of masquerading. |
| AN1845 | Android |
Mobile |
DET0716
|
The OS may show a notification to the user that the Signal or WhatsApp account has been linked to a new device. |
| AN1846 | iOS |
Mobile |
DET0716
|
The OS may show a notification to the user that the Signal or WhatsApp account has been linked to a new device. |
| AN1847 | Android |
Mobile |
DET0717
|
This is abuse of standard OS-level APIs and are therefore typically undetectable to the end user. |
| AN1848 | Android |
Mobile |
DET0718
|
Application vetting services could look for connections to unknown domains or IP addresses. |
| AN1849 | iOS |
Mobile |
DET0718
|
Application vetting services could look for connections to unknown domains or IP addresses. |
| AN1850 | Android |
Mobile |
DET0719
|
Hooking can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior. |
| AN1851 | Android |
Mobile |
DET0720
|
Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code. |
| AN1852 | iOS |
Mobile |
DET0720
|
Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code. |
| AN1853 | Android |
Mobile |
DET0721
|
Application vetting services can detect malicious code in applications. |
| AN1854 | iOS |
Mobile |
DET0721
|
Application vetting services can detect malicious code in applications. |
| AN1855 | None |
ICS |
DET0722
|
Monitor for API calls that can be used to install a hook procedure, such as the SetWindowsHookEx and SetWinEventHook functions. Also consider analyzing hook chains (which hold pointers to hook procedures for each type of hook) using tools or by programmatically examining internal kernel structures. |
| AN1856 | None |
ICS |
DET0723
|
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g., extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g., monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
| AN1857 | None |
ICS |
DET0724
|
Monitor for an authentication attempt by a user that may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. |
| AN1858 | None |
ICS |
DET0725
|
Monitor for newly constructed services/daemons that may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. |
| AN1859 | None |
ICS |
DET0726
|
Monitor login sessions for new or unexpected devices or sessions on wireless networks. |
| AN1860 | None |
ICS |
DET0727
|
Monitor ICS automation network protocols for functions related to reading an operational process state (e.g., "Read" function codes in protocols like DNP3 or Modbus). In some cases, there may be multiple ways to monitor an operational process’ state, one of which is typically used in the operational environment. Monitor for the operating mode being checked in unexpected ways. |
| AN1861 | None |
ICS |
DET0728
|
Monitor for loss of network traffic which could indicate alarms are being suppressed. A loss of expected communications associated with network protocols used to communicate alarm events or process data could indicate this technique is being used. This will not directly detect the technique’s execution, but instead may provide additional evidence that the technique has been used and may complement other detections. |
| AN1862 | None |
ICS |
DET0729
|
No standard detection method currently exists for this technique. |
| AN1863 | None |
ICS |
DET0730
|
Use verification of distributed binaries through hash checking or other integrity checking mechanisms. Scan downloads for malicious signatures. |
| AN1864 | None |
ICS |
DET0731
|
Monitor for firmware changes which may be observable via operational alarms from devices. |
| AN1865 | None |
ICS |
DET0732
|
No standard detection method currently exists for this technique. |
| AN1866 | None |
ICS |
DET0733
|
Monitor for newly executed processes that execute from removable media after it is mounted or when initiated by a user. If a remote access tool is used in this manner to move laterally, then additional actions are likely to occur after execution, such as opening network connections for Command and Control and system and network information Discovery. |
| AN1867 | None |
ICS |
DET0734
|
Monitor for any suspicious attempts to enable script execution on a system. If scripts are not commonly used on a system, but enabled, scripts running out of cycle from patching or other administrator functions are suspicious. Scripts should be captured from the file system when possible, to determine their actions and intent. |
| AN1868 | None |
ICS |
DET0735
|
Monitor command-line arguments for script execution and subsequent behavior. Actions may be related to network and system information Discovery, Collection, or other scriptable post-compromise behaviors and could be used as indicators of detection leading back to the source script. Scripts are likely to perform actions with various effects on a system that may generate events, depending on the types of monitoring used. |
| AN1869 | None |
ICS |
DET0736
|
Analyze network data for uncommon data flows (e.g., new protocols in use between hosts, unexpected ports in use). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. |
| AN1870 | None |
ICS |
DET0737
|
Monitor operational process data for write commands for an excessive number of I/O points or manipulating a single value an excessive number of times. This will not directly detect the technique’s execution, but instead may provide additional evidence that the technique has been used and may complement other detections. |
| AN1871 | None |
ICS |
DET0738
|
Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. |
| AN1872 | None |
ICS |
DET0739
|
Monitor for files (such as /etc/hosts) being accessed that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. |
| AN1873 | None |
ICS |
DET0740
|
Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. Web Application Firewalls may detect improper inputs attempting exploitation. |
| AN1874 | None |
ICS |
DET0741
|
Monitor asset application logs for information that indicate task parameters have changed. Program Download may be used to enable this technique. Monitor for program downloads which may be noticeable via operational alarms. Asset management systems should be consulted to understand expected program versions. |
| AN1875 | None |
ICS |
DET0742
|
Devices that provide user access to the underlying operating system may allow the installation of custom software to monitor OS API execution. Monitoring API calls may generate a significant amount of data and may not be useful for defense unless collected under specific circumstances, since benign use of API functions are common and may be difficult to distinguish from malicious behavior. Correlation of other events with behavior surrounding API function calls using API monitoring will provide additional context to an event that may assist in determining if it is due to malicious behavior. |
| AN1876 | None |
ICS |
DET0743
|
Purely passive network sniffing cannot be detected effectively. In cases where the adversary interacts with the wireless network (e.g., joining a Wi-Fi network) detection may be possible. Monitor for new or irregular network traffic flows which may indicate potentially unwanted devices or sessions on wireless networks. In Wi-Fi networks monitor for changes such as rogue access points or low signal strength, indicating a device is further away from the access point then expected and changes in the physical layer signal. Network traffic content will provide important context, such as hardware (e.g., MAC) addresses, user accounts, and types of messages sent. |
| AN1877 | None |
ICS |
DET0744
|
Monitor for network traffic originating from unknown/unexpected hardware devices. Local network traffic metadata (such as source MAC addressing) may be helpful in identifying transient assets. |
| AN1878 | None |
ICS |
DET0745
|
Monitor for unexpected network share access, such as files transferred between shares within a network using protocols such as Server Message Block (SMB). |
| AN1879 | None |
ICS |
DET0746
|
Various techniques enable spoofing a reporting message. Consider monitoring for Rogue Master and Adversary-in-the-Middle activity which may precede this technique. Various techniques enable spoofing a reporting message. Consider monitoring for Rogue Master and Adversary-in-the-Middle activity. |
| AN1880 | None |
ICS |
DET0747
|
No standard detection method currently exists for this technique. |
| AN1881 | None |
ICS |
DET0749
|
Monitor for unexpected/abnormal access to files that may be malicious collection of local data, such as user files (e.g., .pdf, .docx, .jpg, .dwg ) or local databases. |
| AN1882 | None |
ICS |
DET0750
|
Monitor executed commands and arguments that may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. |
| AN1883 | None |
ICS |
DET0751
|
Monitor executed commands and arguments that may attempt to take screen captures of the desktop to gather information over the course of an operation. |
| AN1884 | None |
ICS |
DET0752
|
Monitor device alarms for program downloads, although not all devices produce such alarms. |
| AN1885 | None |
ICS |
DET0753
|
Devices that provide user access to the underlying operating system may allow the installation of custom software to monitor OS API execution. Monitoring API calls may generate a significant amount of data and may not be useful for defense unless collected under specific circumstances, since benign use of API functions are common and may be difficult to distinguish from malicious behavior. Correlation of other events with behavior surrounding API function calls using API monitoring will provide additional context to an event that may assist in determining if it is due to malicious behavior. |
| AN1886 | None |
ICS |
DET0754
|
Monitor for newly constructed logon behavior within Microsoft's SharePoint can be configured to report access to certain pages and documents. Sharepoint audit logging can also be configured to report when a user shares a resource. The user access logging within Atlassian's Confluence can also be configured to report access to certain pages and documents through AccessLogFilter. Additional log storage and analysis infrastructure will likely be required for more robust detection capabilities. |
| AN1887 | None |
ICS |
DET0755
|
Monitor ICS management protocols for functions that change an asset’s operating mode. |
| AN1888 | None |
ICS |
DET0756
|
Monitor network traffic for default credential use in protocols that allow unencrypted authentication. |
| AN1889 | None |
ICS |
DET0757
|
No standard detection method currently exists for this technique. |
| AN1890 | None |
ICS |
DET0758
|
Monitor for changes made to a large quantity of files for unexpected modifications in both user directories and directories used to store programs and OS components (e.g., C:\Windows\System32). |
| AN1891 | None |
ICS |
DET0759
|
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g., extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g., monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
| AN1892 | None |
ICS |
DET0760
|
On Windows and Unix systems monitor executed commands and arguments that may use shell commands for execution. Shells may be common on administrator, developer, or power user systems depending on job function. On network device and embedded system CLIs consider reviewing command history if unauthorized or suspicious commands were used to modify device configuration. |
| AN1893 | None |
ICS |
DET0761
|
Program uploads may be observable in ICS management protocols or file transfer protocols. Note when protocol functions related to program uploads occur. In cases where the ICS protocols is not well understood, one option is to examine network traffic for the program files themselves using signature-based tools. |
| AN1894 | None |
ICS |
DET0762
|
No standard detection method currently exists for this technique. |
| AN1895 | None |
ICS |
DET0763
|
No standard detection method currently exists for this technique. |
| AN1896 | None |
ICS |
DET0764
|
Monitor HKLM\Software\Policies\Microsoft\Windows NT\DNSClient for changes to the "EnableMulticast" DWORD value. A value of "0" indicates LLMNR is disabled. |
| AN1897 | None |
ICS |
DET0765
|
Monitor for changes made to files that may stop or disable services on a system to render those services unavailable to legitimate users. |
| AN1898 | None |
ICS |
DET0766
|
Monitor for unexpected changes to project files, although if the malicious modification occurs in tandem with legitimate changes it will be difficult to isolate the unintended changes by analyzing only file systems modifications. |
| AN1899 | None |
ICS |
DET0767
|
Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash, which may be recorded in the application log. |
| AN1900 | None |
ICS |
DET0768
|
Monitor ICS automation network protocols for functions related to reading an asset’s operating mode. In some cases, there may be multiple ways to detect a device’s operating mode, one of which is typically used in the operational environment. Monitor for the operating mode being checked in unexpected ways. |
| AN1901 | None |
ICS |
DET0769
|
No standard detection method currently exists for this technique. |
| AN1902 | None |
ICS |
DET0770
|
Monitor executed commands and arguments that may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Also monitor executed commands and arguments that may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network. Information may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell. |
| AN1903 | None |
ICS |
DET0771
|
Monitor for device alarms produced when device management passwords are changed, although not all devices will produce such alarms. |
| AN1904 | None |
ICS |
DET0772
|
Monitor for newly executed processes related to services specifically designed to accept remote graphical connections, such as RDP and VNC. Remote Services and Valid Accounts may be used to access a host’s GUI. |
| AN1905 | None |
ICS |
DET0773
|
A manipulated I/O image requires analyzing the application program running on the PLC for specific data block writes. Detecting this requires obtaining and analyzing a PLC’s application program, either directly from the device or from asset management platforms. |
| AN1906 | None |
ICS |
DET0774
|
Collecting information from the I/O image requires analyzing the application program running on the PLC for specific data block reads. Detecting this requires obtaining and analyzing a PLC’s application program, either directly from the device or from asset management platforms. |
| AN1907 | None |
ICS |
DET0775
|
No standard detection method currently exists for this technique. |
| AN1908 | None |
ICS |
DET0776
|
Monitor asset management systems for device configuration changes which can be used to understand expected parameter settings. |
| AN1909 | None |
ICS |
DET0777
|
Monitor ICS asset application logs that indicate alarm settings have changed, although not all assets will produce such logs. |
| AN1910 | None |
ICS |
DET0778
|
No standard detection method currently exists for this technique. |
| AN1911 | None |
ICS |
DET0779
|
No standard detection method currently exists for this technique. |
| AN1912 | None |
ICS |
DET0780
|
Monitor for changes made to firmware for unexpected modifications to settings and/or data that may be used by rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Asset management systems should be consulted to understand known-good firmware versions and configurations. |
| AN1913 | None |
ICS |
DET0781
|
Monitor for suspicious descendant process spawning from Microsoft Office and other productivity software. For added context on adversary procedures and background see Spearphishing Attachment. |
| AN1914 | None |
ICS |
DET0782
|
Monitor for unusual network traffic that may indicate additional tools transferred to the system. Use network intrusion detection systems, sometimes with SSL/TLS inspection, to look for known malicious scripts (recon, heap spray, and browser identification scripts have been frequently reused), common script obfuscation, and exploit code. |
| AN1915 | None |
ICS |
DET0783
|
Monitor device management protocols for functions that modify programs such as online edit and program append events. |
| AN1916 | None |
ICS |
DET0784
|
Monitor for the termination of processes or services associated with ICS automation protocols and application software which could help detect blocked communications. |
| AN1917 | None |
ICS |
DET0785
|
No standard detection method currently exists for this technique. |
| AN1918 | None |
ICS |
DET0786
|
No standard detection method currently exists for this technique. |
| AN1919 | None |
ICS |
DET0787
|
Monitor for new ICS protocol connections to existing assets or for device scanning (i.e., a host connecting to many devices) over ICS and enterprise protocols (e.g., ICMP, DCOM, WinRM). |
| AN1920 | None |
ICS |
DET0788
|
Monitor ICS automation protocols for anomalies related to reading point or tag data, such as new assets using these functions, changes in volume or timing, or unusual information being queried. Many protocols provide multiple ways to achieve the same result (e.g., functions with/without an acknowledgment or functions that operate on a single point vs. multiple points). Monitor for changes in the functions used. |
| AN1921 | None |
ICS |
DET0789
|
Monitor asset alarms which may help identify a loss of communications. Consider correlating alarms with other data sources that indicate traffic has been blocked, such as network traffic. In cases where alternative methods of communicating with outstations exist alarms may still be visible even if reporting messages are blocked. |
| AN1922 | None |
ICS |
DET0790
|
Monitor for firmware changes which may be observable via operational alarms from devices. |
| AN1923 | None |
ICS |
DET0791
|
Monitor for newly executed processes that depend on user interaction, especially for applications that can embed programmatic capabilities (e.g., Microsoft Office products with scripts, installers, zip files). This includes compression applications, such as those for zip files, that can be used to Deobfuscate/Decode Files or Information in payloads. For added context on adversary procedures and background see User Execution and applicable sub-techniques. |
| AN1924 | None |
ICS |
DET0792
|
Consult asset management systems which may help with the detection of computer systems or network devices that should not exist on a network. |
| AN1925 | None |
ICS |
DET0793
|
Monitor for any suspicious attempts to enable script execution on a system. If scripts are not commonly used on a system, but enabled, scripts running out of cycle from patching or other administrator functions are suspicious. Scripts should be captured from the file system when possible to determine their actions and intent. |
| AN1926 | None |
ICS |
DET0794
|
Monitor industrial process history data for events that correspond with command message functions, such as setpoint modification or changes to system status for key devices. This will not directly detect the technique’s execution, but instead may provide additional evidence that the technique has been used and may complement other detections. Monitoring for unexpected or problematic values below the function level will provide better insights into potentially malicious activity but at the cost of additional false positives depending on the underlying operational process. |
| AN1927 | None |
ICS |
DET0795
|
Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. |
| AN1928 | None |
ICS |
DET0796
|
Monitor logon activity for unexpected or unusual access to devices from the Internet. |
| AN1929 | None |
ICS |
DET0797
|
Monitor asset alarms which may help identify a loss of communications. Consider correlating alarms with other data sources that indicate traffic has been blocked, such as network traffic. In cases where alternative methods of communicating with outstations exist alarms may still be visible even if messages over serial COM ports are blocked. |
| AN1930 | None |
ICS |
DET0798
|
Monitor network traffic for hardcoded credential use in protocols that allow unencrypted authentication. |
| AN1931 | None |
ICS |
DET0799
|
Monitor and analyze traffic flows that do not follow the expected protocol standards and traffic flows (e.g., extraneous packets that do not belong to established flows , or gratuitous or anomalous traffic patterns). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g., monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
| AN1932 | None |
ICS |
DET0800
|
Monitor for newly executed processes that can aid in sniffing network traffic to capture information about an environment. |
| AN1933 | None |
ICS |
DET0801
|
Monitor for a loss of network communications, which may indicate a device has been shutdown or restarted. This will not directly detect the technique’s execution, but instead may provide additional evidence that the technique has been used and may complement other detections. |
| AN1934 | None |
ICS |
DET0802
|
Monitor ICS automation network protocols for information that an asset has been placed into Firmware Update Mode. |
| AN1935 | None |
ICS |
DET0803
|
Monitor for network traffic originating from unknown/unexpected systems. |
| AN1936 | None |
ICS |
DET0804
|
Monitor network data for uncommon data flows (e.g., time of day, unusual source/destination address) that may be related to abuse of Valid Accounts to log into a service specifically designed to accept remote connections, such as RDP, Telnet, SSH, and VNC. |
| AN1937 | PRE |
Enterprise |
DET0805
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1938 | PRE |
Enterprise |
DET0806
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1939 | PRE |
Enterprise |
DET0807
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1940 | PRE |
Enterprise |
DET0808
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the potential use of exploits for vulnerabilities (i.e. Exploit Public-Facing Application, Exploitation for Client Execution, Exploitation for Privilege Escalation, Exploitation for Defense Evasion, Exploitation for Credential Access, Exploitation of Remote Services, and Application or System Exploitation). |
| AN1941 | PRE |
Enterprise |
DET0809
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1942 | PRE |
Enterprise |
DET0810
|
Monitor for suspicious network traffic that could be indicative of adversary reconnaissance, such as rapid successions of requests indicative of web crawling and/or large quantities of requests originating from a single source (especially if the source is known to be associated with an adversary). Analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity, such as referer or user-agent string HTTP/S fields. |
| AN1943 | PRE |
Enterprise |
DET0811
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1944 | PRE |
Enterprise |
DET0812
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1945 | PRE |
Enterprise |
DET0813
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1946 | PRE |
Enterprise |
DET0814
|
Monitor for suspicious network traffic that could be indicative of probing for email addresses and/or usernames, such as large/iterative quantities of authentication requests originating from a single source (especially if the source is known to be associated with an adversary/botnet). Analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity, such as referer or user-agent string HTTP/S fields. |
| AN1947 | PRE |
Enterprise |
DET0815
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1948 | PRE |
Enterprise |
DET0816
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1949 | PRE |
Enterprise |
DET0817
|
Monitoring the content of network traffic can help detect patterns associated with active scanning activities. This can include identifying repeated connection attempts, unusual scanning behaviors, or probing activity targeting multiple IP addresses across a network. |
| AN1950 | PRE |
Enterprise |
DET0818
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1951 | PRE |
Enterprise |
DET0819
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1952 | PRE |
Enterprise |
DET0820
|
Internet scanners may be used to look for patterns associated with malicious content designed to collect client configuration information from visitors. |
| AN1953 | PRE |
Enterprise |
DET0821
|
Monitor social media traffic for suspicious activity, including messages requesting information as well as abnormal file or data transfers (especially those involving unknown, or otherwise suspicious accounts). |
| AN1954 | PRE |
Enterprise |
DET0822
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1955 | PRE |
Enterprise |
DET0823
|
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). Monitor call logs from corporate devices to identify patterns of potential voice phishing, such as calls to/from known malicious phone numbers. |
| AN1956 | PRE |
Enterprise |
DET0824
|
If infrastructure or patterns in malware have been previously identified, internet scanning may uncover when an adversary has staged malware to make it accessible for targeting. |
| AN1957 | PRE |
Enterprise |
DET0825
|
If infrastructure or patterns in the malicious web content utilized to deliver a Drive-by Compromise have been previously identified, internet scanning may uncover when an adversary has staged web content for use in a strategic web compromise. |
| AN1958 | PRE |
Enterprise |
DET0826
|
Internet scanners may be used to look for patterns associated with malicious content designed to collect host information from visitors. |
| AN1959 | PRE |
Enterprise |
DET0827
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. Exploit Public-Facing Application, Exploitation for Client Execution, Exploitation for Privilege Escalation, Exploitation for Defense Evasion, Exploitation for Credential Access, Exploitation of Remote Services, and Application or System Exploitation). |
| AN1960 | PRE |
Enterprise |
DET0828
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1961 | PRE |
Enterprise |
DET0829
|
Once adversaries leverage serverless functions as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle. |
| AN1962 | PRE |
Enterprise |
DET0830
|
Monitor network data for uncommon data flows. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. |
| AN1963 | PRE |
Enterprise |
DET0831
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1964 | PRE |
Enterprise |
DET0832
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1965 | PRE |
Enterprise |
DET0833
|
Consider analyzing self-signed code signing certificates for features that may be associated with the adversary and/or their developers, such as the thumbprint, algorithm used, validity period, and common name. Malware repositories can also be used to identify additional samples associated with the adversary and identify patterns an adversary has used in crafting self-signed code signing certificates. |
| AN1966 | PRE |
Enterprise |
DET0834
|
If infrastructure or patterns in tooling have been previously identified, internet scanning may uncover when an adversary has staged tools to make them accessible for targeting. |
| AN1967 | PRE |
Enterprise |
DET0835
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access (ex: Phishing). |
| AN1968 | PRE |
Enterprise |
DET0836
|
If infrastructure or patterns in the malicious web content related to malvertising have been previously identified, internet scanning may uncover when an adversary has staged malicious web content. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on other phases of the adversary lifecycle, such as Drive-by Compromise or Exploitation for Client Execution. |
| AN1969 | PRE |
Enterprise |
DET0837
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Phishing, Endpoint Denial of Service, or Network Denial of Service. |
| AN1970 | PRE |
Enterprise |
DET0838
|
Once adversaries have provisioned a VPS (ex: for use as a command and control server), internet scans may reveal servers that adversaries have acquired. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. |
| AN1971 | PRE |
Enterprise |
DET0839
|
If infrastructure or patterns in malware, tooling, certificates, or malicious web content have been previously identified, internet scanning may uncover when an adversary has staged their capabilities. |
| AN1972 | PRE |
Enterprise |
DET0840
|
Consider use of services that may aid in the tracking of certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure. |
| AN1973 | PRE |
Enterprise |
DET0841
|
Monitor for suspicious network traffic that could be indicative of probing for user information, such as large/iterative quantities of authentication requests originating from a single source (especially if the source is known to be associated with an adversary/botnet). Analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity, such as referer or user-agent string HTTP/S fields. |
| AN1974 | PRE |
Enterprise |
DET0842
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the potential use of generative artificial intelligence (i.e. Phishing, Phishing for Information). |
| AN1975 | PRE |
Enterprise |
DET0843
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1976 | PRE |
Enterprise |
DET0844
|
Consider use of services that may aid in the tracking of certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure. |
| AN1977 | PRE |
Enterprise |
DET0845
|
Monitor for contextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle. |
| AN1978 | PRE |
Enterprise |
DET0846
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during exfiltration (ex: Transfer Data to Cloud Account). |
| AN1979 | PRE |
Enterprise |
DET0847
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1980 | PRE |
Enterprise |
DET0848
|
Consider use of services that may aid in the tracking of newly issued certificates and/or certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure. Some server-side components of adversary tools may have default values set for SSL/TLS certificates. |
| AN1981 | PRE |
Enterprise |
DET0849
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1982 | PRE |
Enterprise |
DET0850
|
Consider use of services that may aid in the tracking of newly issued certificates and/or certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure. Some server-side components of adversary tools may have default values set for SSL/TLS certificates. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Defense Evasion or Command and Control. |
| AN1983 | PRE |
Enterprise |
DET0851
|
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
| AN1984 | PRE |
Enterprise |
DET0852
|
Monitor for contextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information. In some cases, malware repositories can also be used to identify features of tool use associated with an adversary, such as watermarks in Cobalt Strike payloads. |
| AN1985 | PRE |
Enterprise |
DET0853
|
Consider analyzing malware for features that may be associated with the adversary and/or their developers, such as compiler used, debugging artifacts, or code similarities. Malware repositories can also be used to identify additional samples associated with the adversary and identify development patterns over time. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Defense Evasion or Command and Control. |
| AN1986 | PRE |
Enterprise |
DET0854
|
Once adversaries have provisioned software on a compromised VPS (ex: for use as a command and control server), internet scans may reveal VPSs that adversaries have compromised. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. |
| AN1987 | PRE |
Enterprise |
DET0855
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1988 | PRE |
Enterprise |
DET0856
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1989 | PRE |
Enterprise |
DET0857
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1990 | PRE |
Enterprise |
DET0858
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1991 | PRE |
Enterprise |
DET0859
|
Once adversaries leverage compromised network devices as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle. |
| AN1992 | PRE |
Enterprise |
DET0860
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN1993 | PRE |
Enterprise |
DET0861
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access (ex: Phishing). |
| AN1994 | PRE |
Enterprise |
DET0862
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. |
| AN1995 | PRE |
Enterprise |
DET0863
|
Monitor for logged domain name system (DNS) registry data that may hijack domains and/or subdomains that can be used during targeting. In some cases, abnormal subdomain IP addresses (such as those originating in a different country from the root domain) may indicate a malicious subdomain. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. |
| AN1996 | PRE |
Enterprise |
DET0864
|
Once adversaries leverage serverless functions as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle. |
| AN1997 | PRE |
Enterprise |
DET0865
|
Monitor network data for uncommon data flows. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. |
| AN1998 | PRE |
Enterprise |
DET0866
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. |
| AN1999 | PRE |
Enterprise |
DET0867
|
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
| AN2000 | PRE |
Enterprise |
DET0868
|
Monitor for suspicious network traffic that could be indicative of scanning, such as large quantities originating from a single source (especially if the source is known to be associated with an adversary/botnet). |
| AN2001 | PRE |
Enterprise |
DET0869
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN2002 | PRE |
Enterprise |
DET0870
|
Consider monitoring social media activity related to your organization. Suspicious activity may include personas claiming to work for your organization or recently modified accounts making numerous connection requests to accounts affiliated with your organization. |
| AN2003 | PRE |
Enterprise |
DET0871
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. |
| AN2004 | PRE |
Enterprise |
DET0872
|
Consider analyzing malware for features that may be associated with the adversary and/or their developers, such as compiler used, debugging artifacts, or code similarities. Malware repositories can also be used to identify additional samples associated with the adversary and identify development patterns over time. |
| AN2005 | PRE |
Enterprise |
DET0873
|
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
| AN2006 | PRE |
Enterprise |
DET0874
|
Once adversaries have provisioned software on a compromised server (ex: for use as a command and control server), internet scans may reveal servers that adversaries have compromised. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software. |
| AN2007 | PRE |
Enterprise |
DET0875
|
Consider analyzing code signing certificates for features that may be associated with the adversary and/or their developers, such as the thumbprint, algorithm used, validity period, common name, and certificate authority. Malware repositories can also be used to identify additional samples associated with the adversary and identify patterns an adversary has used in procuring code signing certificates. |
| AN2008 | PRE |
Enterprise |
DET0876
|
Consider monitoring social media activity related to your organization. Suspicious activity may include personas claiming to work for your organization or recently modified accounts making numerous connection requests to accounts affiliated with your organization. |
| AN2009 | PRE |
Enterprise |
DET0877
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN2010 | PRE |
Enterprise |
DET0878
|
Monitor for suspicious email activity, such as numerous accounts receiving messages from a single unusual/unknown sender. Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed. Monitor for references to uncategorized or known-bad sites. URL inspection within email (including expanding shortened links and identifying obfuscated URLs) can also help detect links leading to known malicious sites. Furthermore, monitor browser logs for homographs in ASCII and in internationalized domain names abusing different character sets (e.g. Cyrillic vs Latin versions of trusted sites). Furthermore, monitor network traffic for homographs via the use of internationalized domain names abusing different character sets (e.g. Cyrillic vs Latin versions of trusted sites). Also monitor and analyze traffic patterns and packet inspection for indicators of cloned websites. For example, if adversaries use HTTrack to clone websites, |
| AN2011 | PRE |
Enterprise |
DET0879
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during exfiltration (ex: Transfer Data to Cloud Account). |
| AN2012 | PRE |
Enterprise |
DET0880
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN2013 | PRE |
Enterprise |
DET0881
|
If infrastructure or patterns in the malicious web content related to SEO poisoning or Drive-by Target have been previously identified, internet scanning may uncover when an adversary has staged web content supporting a strategic web compromise. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on other phases of the adversary lifecycle, such as Drive-by Compromise or Exploitation for Client Execution. |
| AN2014 | PRE |
Enterprise |
DET0882
|
Once adversaries leverage the abused web service as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known. |
| AN2015 | PRE |
Enterprise |
DET0883
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Phishing, Endpoint Denial of Service, or Network Denial of Service. |
| AN2016 | PRE |
Enterprise |
DET0884
|
Much of this takes place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN2017 | PRE |
Enterprise |
DET0885
|
Once adversaries have provisioned compromised infrastructure (ex: a server for use in command and control), internet scans may help proactively discover compromised infrastructure. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software. |
| AN2018 | PRE |
Enterprise |
DET0886
|
Monitor call logs from corporate devices to identify patterns of potential voice phishing, such as calls to/from known malicious phone numbers. |
| AN2019 | PRE |
Enterprise |
DET0887
|
Internet scanners may be used to look for patterns associated with malicious content designed to collect host hardware information from visitors. |
| AN2020 | PRE |
Enterprise |
DET0888
|
Internet scanners may be used to look for patterns associated with malicious content designed to collect host software information from visitors. |
| AN2021 | PRE |
Enterprise |
DET0889
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN2022 | PRE |
Enterprise |
DET0890
|
Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access. |
| AN2023 | PRE |
Enterprise |
DET0891
|
Monitor for queried domain name system (DNS) registry data that may compromise third-party DNS servers that can be used during targeting. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. |
| AN2024 | PRE |
Enterprise |
DET0892
|
Monitor logged domain name system (DNS) data for purchased domains that can be used during targeting. Reputation/category-based detection may be difficult until the categorization is updated. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access and Command and Control. |
| AN2025 | PRE |
Enterprise |
DET0893
|
If infrastructure or patterns in malicious web content have been previously identified, internet scanning may uncover when an adversary has staged web content to make it accessible for targeting. |
| AN2026 | PRE |
Enterprise |
DET0894
|
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. Exploit Public-Facing Application, Exploitation for Client Execution, Exploitation for Privilege Escalation, Exploitation for Defense Evasion, Exploitation for Credential Access, Exploitation of Remote Services, and Application or System Exploitation). |
| AN2027 | PRE |
Enterprise |
DET0895
|
Monitor for contextual data about an Internet-facing resource gathered from a scan, such as running services or ports that may buy, lease, or rent infrastructure that can be used during targeting. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. |
| AN2028 | PRE |
Enterprise |
DET0896
|
Once adversaries leverage the web service as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control (Web Service) or Exfiltration Over Web Service. |
| AN2029 | Windows |
Enterprise |
DET0898
|
Process execution without GUI context (e.g., powershell.exe, wscript.exe) generates HTTP traffic with a spoofed User-Agent mimicking a legitimate browser. No corresponding UI application (e.g., msedge.exe) is active or in parent lineage. The User-Agent deviates from known enterprise baselines or contains spoofed platform indicators. User-Agent strings can be gathered with API calls such as |
| AN2030 | Windows |
Enterprise |
DET0897
|
A process with no prior history or outside of known whitelisted tools initiates file or registry modifications to configure exclusion rules for antivirus, backup, or file-handling systems. Or a file system enumeration for specific file names andcritical extensions like .dll, .exe, .sys, or specific directories such as 'Program Files' or security tool paths or system component discovery for the exclusion of the files or components. |
| AN2031 | Linux |
Enterprise |
DET0898
|
Detection of HTTP outbound requests with inconsistent or spoofed User-Agent headers from command-line tools (e.g., curl, wget, python requests) following interactive user shells or scheduled jobs outside of normal user session behavior. |
| AN2032 | macOS |
Enterprise |
DET0898
|
Observation of scripted network requests (e.g., using osascript, curl, or python) that include mismatched or spoofed browser User-Agent strings compared to the typical macOS Safari or Chrome baseline, especially when triggered by non-interactive launch agents, login hooks, or background daemons. |