Application Log Content

Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples:

  • Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).
  • Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).
  • SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.
  • Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.
  • System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.

This data component can be collected through the following measures:

Configure Application Logging

  • Enable logging within the application or service.
  • Examples:
    • Web Servers: Enable access and error logs in NGINX or Apache.
    • Email Systems: Enable audit logging in Microsoft Exchange or Gmail.

Centralized Log Management

  • Use log management solutions like Splunk, or a cloud-native logging solution.
  • Configure the application to send logs to a centralized system for analysis.

Cloud-Specific Collection

  • Use services like AWS CloudWatch, Azure Monitor, or Google Cloud Operations Suite for cloud-based applications.
  • Ensure logging is enabled for all critical resources (e.g., API calls, IAM changes).

SIEM Integration

  • Integrate application logs with a SIEM platform (e.g., Splunk, QRadar) for real-time correlation and analysis.
  • Use parsers to standardize log formats and extract key fields like timestamps, user IDs, and error codes.
ID: DC0038
Domains: ICS, Enterprise
Version: 2.0
Created: 20 October 2021
Last Modified: 21 October 2025

Log Sources

Name Channel
Application Log None
Application:Mail smtpd$.*$: .*from=[.*@internaldomain.com](mailto:.*@internaldomain.com) to=[.*@internaldomain.com](mailto:.*@internaldomain.com)
Application:Mail Inbound messages with anomalous headers, spoofed SPF/DKIM failures
Application:Mail Inbound emails containing hyperlinks from suspicious sources
Application:Mail Inbound email attachments logged from MTAs with suspicious metadata
Application:Mail Mismatch between authenticated username and From header in email
Application:Mail High-frequency inbound mail activity to a specific recipient address
ApplicationLog:API Docker/Kubernetes API access from external sources
ApplicationLog:CallRecords Outbound or inbound calls to high-risk or blocklisted numbers
ApplicationLog:EntraIDPortal DeviceRegistration events
ApplicationLog:IIS IIS W3C logs in C:\inetpub\logs\LogFiles\W3SVC* (spikes in 5xx, RCE/SQLi/path traversal/JNDI patterns)
ApplicationLog:Ingress Kubernetes NGINX/Envoy ingress controller logs with anomalous payloads and 5xx spikes
ApplicationLog:Intune/MDM Logs Enrollment events (e.g., MDMDeviceRegistration)
ApplicationLog:MailServer Unexpected additions of sieve rules or filtering directives
ApplicationLog:Outlook Outlook client-level rule creation actions not consistent with normal user activity
ApplicationLog:WebServer /var/log/httpd/access_log, /var/log/apache2/access.log, /var/log/nginx/access.log with exploit indicators and burst errors
AWS:CloudTrail SendEmail
AWS:CloudTrail InvokeModel
AWS:CloudTrail InvokeFunction: Unexpected or repeated invocation of functions not tied to known workflows
AWS:CloudTrail CreateUser|AttachRolePolicy|CreateAccessKey|UpdateAssumeRolePolicy|CreateLoginProfile
AWS:CloudTrail StopLogging, DeleteTrail, UpdateTrail: API calls that disable or modify logging services
AWS:CloudWatch Repeated crash pattern within container or instance logs
AWS:CloudWatch Elevated 5xx response rates in application logs or gateway layer
azure:activity Add role assignment / ElevateAccess / Create service principal
azure:audit App registrations or consent grants by abnormal users or at unusual times
azure:signinLogs ConsentGrant: Suspicious consent grants to non-approved or unknown applications
azure:signinlogs Modify Conditional Access Policy
azure:signinlogs Register PTA Agent or Modify AD FS trust
azure:signinlogs Resource access initiated using application credentials, not user accounts
docker:daemon container_create,container_start
docker:events Container exited with non-zero code repeatedly in short period
docker:runtime execution of cloud CLI tool (e.g., aws, az) inside container
EDR:detection ThreatDetected, QuarantineLog
EDR:detection ThreatLog
esxi:esxupdate /var/log/esxupdate.log contains VIB installed with `--force` or `--no-sig-check` and non-standard acceptance levels
esxi:hostd /var/log/hostd.log anomalies (faults, crashes, restarts) around inbound connections
esxi:hostd Keywords: 'Backtrace','Signal 11','PANIC','hostd restarted','assert' or 'Service terminated unexpectedly' in /var/log/hostd.log, /var/log/vmkernel.log, /var/log/syslog.log.
esxi:hostd unexpected script/command invocations via hostd
esxi:hostd Guest Operations API invocation: StartProgramInGuest, ListProcessesInGuest, ListFileInGuest, InitiateFileTransferFromGuest
esxi:hostd unexpected script invocations producing long encoded strings
esxi:hostd Host daemon command log entries related to vib enumeration
esxi:hostd New extension/module install with unknown vendor ID
esxi:vmkernel vmkernel / OpenSLP logs for malformed requests
esxi:vpxd Symmetric crypto routines triggered for external session
esxi:vpxd ESXi process initiating asymmetric handshake with external host
gcp:workspaceaudit SendAs: Outbound messages with alias identities that differ from primary account
journald:Application Segfault or crash log entry associated with specific application binary
journald:systemd Repeated service restart attempts or unit failures
kubernetes:orchestrator Access to orchestrator logs containing credentials (Docker/Kubernetes logs)
linux:cli cleared or truncated .bash_history
linux:syslog usb * new|thunderbolt|pci .* added|block.*: new .* device
linux:syslog Inbound messages from webmail services containing attachments or URLs
linux:syslog kernel|systemd messages indicating 'segmentation fault'|'core dumped'|'service terminated unexpectedly' for sshd, smbd, vsftpd, mysqld, httpd, etc.
linux:syslog System daemons initiating encrypted sessions with unexpected destinations
linux:syslog milter configuration updated, transport rule initialized, unexpected script execution
linux:syslog Repetitive HTTP 408, 500, or 503 errors logged within short timeframe
linux:syslog Application or browser logs (webview errors, plugin enumerations) indicating suspicious script evaluation or plugin loads
linux:syslog processes binding to non-standard ports or sshd configured on unexpected port
linux:syslog system daemons initiating TLS sessions outside expected services
linux:syslog browser/office crash, segfault, abnormal termination
linux:syslog Error/warning logs from services indicating load spike or worker exhaustion
linux:syslog SPF fail OR DKIM fail OR DMARC fail OR mismatched from_domain vs return_path_domain
linux:syslog suspicious DHCP lease assignment with unexpected DNS or gateway
linux:syslog opened document|clicked link|segfault|abnormal termination|sandbox
linux:syslog Authentication attempts into finance-related servers from unusual IPs or times
linux:syslog sshd sessions with unusual port forwarding parameters
linux:syslog Non-standard processes negotiating SSL/TLS key exchanges
linux:syslog Module registration or stacktrace logs indicating segmentation faults or unknown module errors
linux:syslog Segfaults, kernel oops, or crashes in security software processes
m365:exchange Emails containing cleartext secrets (password=, api_key=, token=) shared across internal/external domains
m365:exchange Transport Rule Modification
m365:exchange Admin Audit Logs, Transport Rules
m365:exchange MailDelivery: High-frequency delivery of messages or attachments to a single recipient
m365:exchange New-InboxRule: Automation that triggers abnormal forwarding or external link generation
m365:exchange MessageTrace logs
m365:mailboxaudit Outlook rule creation or custom form deployment
m365:messagetrace AuthenticationDetails=fail OR SPF=fail OR DKIM=fail OR DMARC=fail
m365:messagetrace X-MS-Exchange-Organization-AutoForwarded
m365:purview MailItemsAccessed & Exchange Audit
m365:purview MailItemsAccessed, Search-Mailbox events
m365:unified Unusual form activity within Outlook client, including load of non-default forms
m365:unified SendOnBehalf, MessageSend, ClickThrough, MailItemsAccessed
m365:unified SendOnBehalf, MessageSend, AttachmentPreviewed
m365:unified Send/Receive: Emails with suspicious sender domains, spoofed headers, or anomalous attachment types
m365:unified FileAccessed: Access of email attachments by Office applications
m365:unified Creation or modification of inbox rule outside of normal user behavior
m365:unified Send/Receive: Inbound emails containing embedded or shortened URLs
m365:unified AppRegistration: Unexpected application registration or OAuth authorization
m365:unified MessageSend, MessageRead, or FileAttached events containing credential-like patterns
m365:unified Set-Mailbox, Add-InboxRule, RegisterWebhook
m365:unified ConsentGranted: Abuse of application integrations to mint tokens bypassing MFA
m365:unified Application Consent grants, new OAuth client registrations, or unusual admin-level activities executed by a user account shortly after suspected drive-by compromise
m365:unified Folder configuration updated with external or HTML-formatted Home Page via Set-MailboxFolder
m365:unified PurgeAuditLogs, Remove-MailboxAuditLog
m365:unified Set-CsOnlineUser or UpdateAuthPolicy
m365:unified New-InboxRule or Set-InboxRule events recorded in Exchange Online
m365:unified Transport rule or inbox rule creation events
m365:unified GAL Lookup or Address Book download
m365:unified Send/Receive: Inbound emails with attachments from suspicious or spoofed senders
m365:unified certificate added or modified in application credentials
m365:unified Unusual MFA requests or OAuth consent events temporally aligned with user-reported vishing call
m365:unified Set federation settings on domain|Set domain authentication|Add federated identity provider
m365:unified SendOnBehalf/SendAs: Emails sent where the sending identity mismatches account ownership
m365:unified Set-MailboxAutoReplyConfiguration: Unexpected rule changes creating impersonated replies
m365:unified SendOnBehalf/SendAs: Office Suite initiated messages using impersonated identities
m365:unified Read-only configuration review from GUI
m365:unified Modify Federation Settings or Update Authentication Policy
m365:unified Send/Receive: Unusual spikes in inbound messages to a single recipient
m365:unified PowerShell: Add-MailboxPermission
m365:unified Add-MailboxPermission or Set-ManagementRoleAssignment
m365:unified Set-PartnerOfRecord / CompanyAdministrator role assignments / New-DelegatedAdminRelationship
m365:unified Add-DelegatedAdmin, Set-PartnerOfRecord, Add-MailboxPermission, Set-OrganizationRelationship
m365:unified MailSend: Outlook messages with suspicious subject/body terms (e.g., urgent payment, wire transfer) targeting finance teams
m365:unified FileAccessed, FileDownloaded, SearchQueried
m365:unified Detection of hidden macro streams or SetHiddenAttribute actions
m365:unified RunMacro
m365:unified FileUploaded or FileCopied events
m365:unified TeamsMessageAccess, TeamsExport, ExternalAppAccess
m365:unified TeamsMessagesAccessedViaEDiscovery, TeamsGraphMessageExport
m365:unified FileAccessed
m365:unified ApplicationModified, ConsentGranted: Unexpected app consent or modification events linked to security evasion
macos:jamf RemoteCommandExecution
macos:unifiedlog Device attached|enumerated VID/PID
macos:unifiedlog Inbound email activity with suspicious domains or mismatched sender information
macos:unifiedlog App/web server logs ingested via unified logging or filebeat (nginx/apache/node).
macos:unifiedlog Received messages with embedded or shortened URLs
macos:unifiedlog Received messages containing embedded links or attachments from non-enterprise services
macos:unifiedlog process 'crashed'|'EXC_BAD_ACCESS' for sshd, screensharingd, httpd; launchd restarts of these daemons.
macos:unifiedlog opendirectoryd crashes or abnormal authentication errors
macos:unifiedlog Logs from unifiedlogging that show browser crashes, plugin enumerations, extension installs or errors around the same time as suspicious network fetches
macos:unifiedlog log stream cleared or truncated
macos:unifiedlog quarantine or AV-related subsystem
macos:unifiedlog Repeated process crashes logged by CrashReporter or system instability logs in com.apple.console
macos:unifiedlog Inbound messages with attachments from suspicious domains
macos:unifiedlog Outgoing or incoming calls with non-standard caller IDs or unusual metadata
macos:unifiedlog Mail.app or third-party clients sending messages with mismatched From headers
macos:unifiedlog process crash, abort, code signing violations
macos:unifiedlog Configuration profile modified or new profile installed
macos:unifiedlog Crash log entries for a process receiving malformed input or known exploit patterns
macos:unifiedlog Repetitive inbound email delivery activity logged within a short time window
macos:unifiedlog Application errors or resource contention from excessive frontend or script invocation
macos:unifiedlog SPF fail OR DKIM fail OR DMARC fail OR mismatched header vs envelope domains
macos:unifiedlog new DHCP configuration with anomalous DNS or router values
macos:unifiedlog Mail or AppleScript subsystem
macos:unifiedlog opened document|clicked link|EXC_BAD_ACCESS|abort|LSQuarantine
macos:unifiedlog Anomalous keychain access attempts targeting payment credentials
macos:unifiedlog Abnormal terminations of com.apple.security.* or 3rd-party security daemons
networkdevice:controlplane Syslog from edge devices with HTTP 500s on mgmt portal, SmartInstall events, unexpected CLI commands
networkdevice:syslog config push events
networkdevice:syslog SIP REGISTER, INVITE, or unusual call destination metadata
networkdevice:syslog Failed authentication requests redirected to non-standard portals
NSM:Connections PushNotificationSent
NSM:Connections Failed password or accepted password for SSH users
saas:Airtable EXPORT: User-triggered data export via GUI or API
saas:application High-frequency invocation of SMS-related API endpoints from publicly accessible OTP or verification forms (e.g., Twilio: SendMessage, Cognito: AdminCreateUser) with irregular destination patterns.
saas:application High-volume API calls or traffic via messaging or webhook service
saas:audit Rule/ConfigChange: Auto-forward rules, delegate assignments, or changes to financial approval workflows
saas:audit Application added or consent granted: Integration persisting after original user disabled
saas:box User navigated to admin interface
saas:collaboration MessagePosted: Suspicious links or attachment delivery via collaboration tools (Slack, Teams, Zoom)
saas:confluence access.content
saas:email AuthenticationFailures (SPF/DKIM/DMARC) OR Domain Mismatch
saas:finance Transaction/Transfer: Unusual or large transactions initiated outside business hours or by unusual accounts
saas:github Bulk access to multiple files or large volume of repo requests within short time window
saas:gmail SendEmail, OpenAttachment, ClickLink
saas:googledrive FileOpen / FileAccess: Event-driven script triggering on user file actions
saas:googleworkspace OAuth2 authorization grants / Admin role assignments
saas:hubspot contact_viewed, contact_exported, login
saas:okta Conditional Access policy rule modified or MFA requirement disabled
saas:okta MFAChallengeIssued
saas:okta WebUI access to administrator dashboard
saas:okta Federation configuration update or signing certificate change
saas:okta System API Call: user.read, group.read
saas:openai High volume of requests to /v1/chat/completions or /v1/images/generations
saas:salesforce DataExport, RestAPI, Login, ReportExport
saas:slack file_upload, message_send, message_click
saas:slack chat.postMessage, files.upload, or discovery API calls involving token/credential regex
saas:slack OAuth token use by unknown app client_id accessing private channels or files
saas:slack conversations.history, files.list, users.info, audit_logs
saas:Snowflake QUERY: Large or repeated SELECT * queries to sensitive tables
saas:teams ChatMessageSent, ChatMessageEdited, LinkClick
saas:zoom unusual web session tokens and automation patterns during login
WinEventLog:Application Outlook errors loading or processing custom form templates
WinEventLog:Application Office Add-in load errors, abnormal loading context, or unsigned add-in warnings
WinEventLog:Application Outlook rule execution failure or abnormal rule execution context
WinEventLog:Application Exchange Transport Service loads unusual .NET assembly or errors upon transport agent execution
WinEventLog:Application Unexpected spikes in request volume, application-level errors, or thread pool exhaustion in web or API logs
WinEventLog:Application Browser or plugin/application logs showing script errors, plugin enumerations, or unusual extension load events
WinEventLog:Application Outlook logs indicating failure to load or render HTML page in Home Page view
WinEventLog:Application EventCode=1000-1026
WinEventLog:Application Service crash, unhandled exception, or application hang warnings for critical services (e.g., IIS, DNS, SQL Server)
WinEventLog:Application SCCM, Intune logs
WinEventLog:Application Unexpected web application errors or CMS logs showing modification to index.html, default.aspx, or other public-facing files
WinEventLog:Application EventCode=1000
WinEventLog:Application EventCode=1000, 1001, 1002
WinEventLog:Application VPN, Citrix, or remote access gateway logs showing external IP addresses
WinEventLog:Application Outlook rule creation, form load, or homepage redirection
WinEventLog:Application High-frequency errors or hangs from resource-intensive application components (e.g., .NET, IIS, Office Suite)
WinEventLog:Application Exchange logs or header artifacts
WinEventLog:Application EventCode=1000,1001
WinEventLog:Application Unusual DLL/plugin registration for IIS/SQL/Apache or unexpected error logs
WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational Device started/installed (UMDF) GUIDs
WinEventLog:Security EventCode=6416
WinEventLog:Security EventCode=1102
WinEventLog:Security EventCode=4663
WinEventLog:System Changes to applicationhost.config or DLLs loaded by w3wp.exe
WinEventLog:System EventCode=7031,7034,1000,1001
WinEventLog:System EventCode=104
WinEventLog:System EventCode=1341,1342,1020,1063

Detection Strategy

ID Name Technique Detected
DET0413 Abuse of Information Repositories for Data Collection T1213
DET0415 Application Exhaustion Flood Detection Across Platforms T1499.003
DET0124 Behavior-chain detection for T1132.001 Data Encoding: Standard Encoding (Base64/Hex/MIME) across Windows, Linux, macOS, ESXi T1132.001
DET0326 Behavior-chain detection for T1132.002 Data Encoding: Non-Standard Encoding across Windows, Linux, macOS, ESXi T1132.002
DET0354 Behavior-chain detection for T1133 External Remote Services across Windows, Linux, macOS, Containers T1133
DET0249 Behavior-chain detection for T1610 Deploy Container across Docker & Kubernetes control/node planes T1610
DET0184 Behavioral Detection of Indicator Removal Across Platforms T1070
DET0266 Behavioral Detection of Mailbox Data and Log Deletion for Anti-Forensics T1070.008
DET0338 Behavioral Detection Strategy for Use Alternate Authentication Material (T1550) T1550
DET0386 Cloud Account Enumeration via API, CLI, and Scripting Interfaces T1087.004
DET0573 Cross-Platform Detection of Data Transfer to Cloud Account T1537
DET0238 Defacement via File and Web Content Modification Across Platforms T1491
DET0198 Detect Abuse of Container APIs for Credential Access T1552.007
DET0488 Detect abuse of Trusted Relationships (third-party and delegated admin access) T1199
DET0535 Detect Abuse of vSphere Installation Bundles (VIBs) for Persistent Access T1505.006
DET0412 Detect Access or Search for Unsecured Credentials Across Platforms T1552
DET0296 Detect Adversary-in-the-Middle via Network and Configuration Anomalies T1557
DET0030 Detect Conditional Access Policy Modification in Identity and Cloud Platforms T1556.009
DET0468 Detect DHCP Spoofing Across Linux, Windows, and macOS T1557.003
DET0187 Detect disabled Windows event logging T1562.002
DET0379 Detect Evil Twin Wi-Fi Access Points on Network Devices T1557.004
DET0293 Detect Hybrid Identity Authentication Process Modification T1556.007
DET0190 Detect MFA Modification or Disabling Across Platforms T1556.006
DET0398 Detect Office Startup-Based Persistence via Macros, Forms, and Registry Hooks T1137
DET0050 Detect Persistence via Malicious Office Add-ins T1137.006
DET0095 Detect Persistence via Malicious Outlook Rules T1137.005
DET0029 Detect Persistence via Outlook Custom Forms Triggered by Malicious Email T1137.003
DET0177 Detect Persistence via Outlook Home Page Exploitation T1137.004
DET0048 Detect Remote Email Collection via Abnormal Login and Programmatic Access T1114.002
DET0069 Detect unauthorized or suspicious Hardware Additions (USB/Thunderbolt/Network) T1200
DET0111 Detect Unsecured Credentials Shared in Chat Messages T1552.008
DET0500 Detecting Abnormal SharePoint Data Mining by Privileged or Rare Users T1213.002
DET0263 Detecting Bulk or Anomalous Access to Private Code Repositories via SaaS Platforms T1213.003
DET0550 Detecting Suspicious Access to CRM Data in SaaS Environments T1213.004
DET0567 Detecting Unauthorized Collection from Messaging Applications in SaaS and Office Environments T1213.005
DET0802 Detection of Activate Firmware Update Mode T0800
DET0223 Detection of Adversary Abuse of Software Deployment Tools T1072
DET0764 Detection of Adversary-in-the-Middle T0830
DET0784 Detection of Block Command Message T0803
DET0789 Detection of Block Reporting Message T0804
DET0797 Detection of Block Serial COM T0805
DET0737 Detection of Brute Force I/O T0806
DET0755 Detection of Change Operating Mode T0858
DET0291 Detection of Cloud Service Dashboard Usage via GUI-Based Cloud Access T1538
DET0760 Detection of Command-Line Interface T0807
DET0754 Detection of Data from Information Repositories T0811
DET0723 Detection of Denial of Service T0814
DET0801 Detection of Device Restart/Shutdown T0816
DET0270 Detection of Domain or Tenant Policy Modifications via AD and Identity Provider T1484
DET0782 Detection of Drive-by Compromise T0817
DET0532 Detection of Event Log Clearing on Windows via Behavioral Chain T1070.001
DET0740 Detection of Exploit Public-Facing Application T0819
DET0795 Detection of Exploitation for Evasion T0820
DET0738 Detection of Exploitation for Privilege Escalation T0890
DET0767 Detection of Exploitation of Remote Services T0866
DET0803 Detection of External Remote Services T0822
DET0777 Detection of Modify Alarm Settings T0838
DET0741 Detection of Modify Controller Tasking T0821
DET0776 Detection of Modify Parameter T0836
DET0783 Detection of Modify Program T0889
DET0790 Detection of Module Firmware T0839
DET0727 Detection of Monitor Process State T0801
DET0823 Detection of Phishing for Information T1598
DET0788 Detection of Point & Tag Identification T0861
DET0752 Detection of Program Download T0843
DET0761 Detection of Program Upload T0845
DET0792 Detection of Rogue Master T0848
DET0810 Detection of Search Victim-Owned Websites T1594
DET0865 Detection of Spearphishing Attachment T1598.002
DET0781 Detection of Spearphishing Attachment T0865
DET0878 Detection of Spearphishing Link T1598.003
DET0821 Detection of Spearphishing Service T1598.001
DET0886 Detection of Spearphishing Voice T1598.004
DET0731 Detection of System Firmware T0857
DET0744 Detection of Transient Cyber Asset T0864
DET0458 Detection of Trust Relationship Modifications in Domain or Tenant Policies T1484.002
DET0794 Detection of Unauthorized Command Message T0855
DET0791 Detection of User Execution T0863
DET0509 Detection of Web Session Cookie Theft via File, Memory, and Network Artifacts T1539
DET0726 Detection of Wireless Compromise T0860
DET0373 Detection Strategy for Addition of Email Delegate Permissions T1098.002
DET0539 Detection Strategy for Cloud Application Integration T1671
DET0147 Detection Strategy for Cloud Service Hijacking via SaaS Abuse T1496.004
DET0355 Detection Strategy for Email Bombing T1667
DET0192 Detection Strategy for Email Hiding Rules T1564.008
DET0431 Detection Strategy for Email Spoofing T1672
DET0273 Detection Strategy for Encrypted Channel across OS Platforms T1573
DET0543 Detection Strategy for Encrypted Channel via Asymmetric Cryptography across OS Platforms T1573.002
DET0143 Detection Strategy for Encrypted Channel via Symmetric Cryptography across OS Platforms T1573.001
DET0304 Detection Strategy for Endpoint DoS via Application or System Exploitation T1499.004
DET0173 Detection Strategy for Endpoint DoS via Service Exhaustion Flood T1499.002
DET0232 Detection Strategy for ESXi Administration Command T1675
DET0548 Detection Strategy for Exfiltration Over Web Service T1567
DET0153 Detection Strategy for Exfiltration Over Webhook T1567.004
DET0174 Detection Strategy for Exploitation for Credential Access T1212
DET0595 Detection Strategy for Exploitation for Defense Evasion T1211
DET0495 Detection Strategy for Financial Theft T1657
DET0502 Detection Strategy for Hidden Artifacts Across Platforms T1564
DET0286 Detection Strategy for Impersonation T1656
DET0189 Detection Strategy for Indicator Removal from Tools - Post-AV Evasion Modification T1027.005
DET0160 Detection Strategy for Multi-Factor Authentication Request Generation (T1621) T1621
DET0227 Detection Strategy for Non-Standard Ports T1571
DET0070 Detection Strategy for Phishing across platforms. T1566
DET0538 Detection Strategy for Protocol Tunneling accross OS platforms. T1572
DET0156 Detection Strategy for Resource Hijacking: SMS Pumping via SaaS Application Logs T1496.003
DET0374 Detection Strategy for Serverless Execution (T1648) T1648
DET0236 Detection Strategy for Spearphishing Attachment across OS Platforms T1566.001
DET0107 Detection Strategy for Spearphishing Links T1566.002
DET0115 Detection Strategy for Spearphishing via a Service across OS Platforms T1566.003
DET0245 Detection Strategy for Spearphishing Voice across OS platforms T1566.004
DET0240 Detection Strategy for Steal or Forge Authentication Certificates T1649
DET0547 Detection Strategy for T1505 - Server Software Component T1505
DET0166 Detection Strategy for T1505.002 - Transport Agent Abuse (Windows/Linux) T1505.002
DET0068 Detection Strategy for T1505.004 - Malicious IIS Components T1505.004
DET0515 Detection Strategy for T1528 - Steal Application Access Token T1528
DET0393 Detection Strategy for Temporary Elevated Cloud Access Abuse (T1548.005) T1548.005
DET0176 Drive-by Compromise — Behavior-based, Multi-platform Detection Strategy (T1189) T1189
DET0476 Email Collection via Local Email Access and Auto-Forwarding Behavior T1114
DET0576 Email Forwarding Rule Abuse Detection Across Platforms T1114.003
DET0208 Endpoint Resource Saturation and Crash Pattern Detection Across Platforms T1499
DET0229 Enumeration of Global Address Lists via Email Account Discovery T1087.003
DET0080 Exploit Public-Facing Application – multi-signal correlation (request → error → post-exploit process/egress) T1190
DET0287 Exploitation for Client Execution – cross-platform behavior chain (browser/Office/3rd-party apps) T1203
DET0118 Exploitation of Remote Services – multi-platform lateral movement detection T1210
DET0054 Internal Spearphishing via Trusted Accounts T1534
DET0392 Multi-Platform Software Discovery Behavior Chain T1518
DET0358 Programmatic and Excessive Access to Confluence Documentation T1213.001
DET0267 Resource Hijacking Detection Strategy T1496
DET0242 Suspicious Database Access and Dump Activity Across Environments (T1213.006) T1213.006
DET0036 Suspicious Device Registration via Entra ID or MFA Platform T1098.005
DET0478 User Execution – multi-surface behavior chain (documents/links → helper/unpacker → LOLBIN/child → egress) T1204