open-menu
closeme
M365 OneDrive Excessive File Downloads with OAuth Token
calendar
Mar 20, 2025
·
Domain: Cloud
Domain: SaaS
Data Source: Microsoft 365
Data Source: SharePoint
Data Source: OneDrive
Use Case: Threat Detection
Tactic: Collection
Tactic: Exfiltration
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Deprecated - Sensitive Files Compression Inside A Container
calendar
Mar 14, 2025
·
Data Source: Elastic Defend for Containers
Domain: Container
OS: Linux
Use Case: Threat Detection
Tactic: Collection
Tactic: Credential Access
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Exporting Exchange Mailbox via PowerShell
calendar
Feb 19, 2025
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Tactic: Execution
Resources: Investigation Guide
Data Source: Elastic Endgame
Data Source: Elastic Defend
Data Source: SentinelOne
Data Source: Microsoft Defender for Endpoint
Data Source: Windows Security Event Logs
Data Source: Crowdstrike
Data Source: Sysmon
·
Share on:
twitter
facebook
linkedin
copy
Suspicious Inter-Process Communication via Outlook
calendar
Feb 17, 2025
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Data Source: Elastic Defend
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
AWS S3 Unauthenticated Bucket Access by Rare Source
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Data Source: Amazon S3
Use Case: Asset Visibility
Resources: Investigation Guide
Tactic: Collection
·
Share on:
twitter
facebook
linkedin
copy
AWS CloudTrail Log Created
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Use Case: Log Auditing
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
AWS EC2 Full Network Packet Capture Detected
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Use Case: Network Security Monitoring
Tactic: Exfiltration
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
AWS EC2 VM Export Failure
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: AWS
Data Source: Amazon Web Services
Use Case: Asset Visibility
Tactic: Exfiltration
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Azure Event Hub Authorization Rule Created or Updated
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: Azure
Use Case: Log Auditing
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
GCP Pub/Sub Subscription Creation
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: GCP
Data Source: Google Cloud Platform
Use Case: Log Auditing
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
GCP Pub/Sub Topic Creation
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: GCP
Data Source: Google Cloud Platform
Use Case: Log Auditing
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Linux Clipboard Activity Detected
calendar
Jan 22, 2025
·
Domain: Endpoint
OS: Linux
Use Case: Threat Detection
Tactic: Collection
Data Source: Elastic Defend
Data Source: Elastic Endgame
Data Source: Auditd Manager
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Microsoft 365 Inbox Forwarding Rule Created
calendar
Jan 22, 2025
·
Domain: Cloud
Data Source: Microsoft 365
Use Case: Configuration Audit
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Script with Webcam Video Capture Capabilities
calendar
Jan 22, 2025
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Data Source: PowerShell Logs
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Sensitive Files Compression
calendar
Jan 22, 2025
·
Domain: Endpoint
OS: Linux
Use Case: Threat Detection
Tactic: Collection
Tactic: Credential Access
Data Source: Elastic Endgame
Data Source: Elastic Defend
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Encrypting Files with WinRar or 7z
calendar
Nov 5, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Resources: Investigation Guide
Data Source: Elastic Endgame
Data Source: Elastic Defend
Data Source: Sysmon
Data Source: Microsoft Defender for Endpoint
Data Source: SentinelOne
·
Share on:
twitter
facebook
linkedin
copy
Exchange Mailbox Export via PowerShell
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Resources: Investigation Guide
Data Source: PowerShell Logs
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Keylogging Script
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Resources: Investigation Guide
Data Source: PowerShell Logs
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Mailbox Collection Script
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Data Source: PowerShell Logs
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Share Enumeration Script
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Discovery
Tactic: Collection
Tactic: Execution
Resources: Investigation Guide
Data Source: PowerShell Logs
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Suspicious Discovery Related Windows API Functions
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Discovery
Tactic: Collection
Tactic: Execution
Resources: Investigation Guide
Data Source: PowerShell Logs
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Suspicious Script with Audio Capture Capabilities
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Resources: Investigation Guide
Data Source: PowerShell Logs
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Suspicious Script with Clipboard Retrieval Capabilities
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Data Source: PowerShell Logs
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
PowerShell Suspicious Script with Screenshot Capabilities
calendar
Oct 28, 2024
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Collection
Resources: Investigation Guide
Data Source: PowerShell Logs
·
Share on:
twitter
facebook
linkedin
copy
Google Drive Ownership Transferred via Google Workspace
calendar
Sep 25, 2024
·
Domain: Cloud
Data Source: Google Workspace
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Google Workspace Custom Gmail Route Created or Modified
calendar
Sep 25, 2024
·
Domain: Cloud
Data Source: Google Workspace
Tactic: Collection
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
to-top