Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
AWS CloudWatch Alarm Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of an AWS CloudWatch alarm. An adversary may delete alarms in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:monitoring.amazonaws.com and event.action:DeleteAlarms and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
AWS CloudWatch Alarm Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of an AWS CloudWatch alarm. An adversary may delete alarms in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:monitoring.amazonaws.com and event.action:DeleteAlarms and event.outcome:success
AWS Configuration Recorder Stopped
- source: elastic
- technicques:
- T1562
Description
Identifies an AWS configuration change to stop recording a designated set of resources.
Detection logic
event.dataset:aws.cloudtrail and event.provider:config.amazonaws.com and event.action:StopConfigurationRecorder and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
AWS CloudWatch Alarm Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of an AWS CloudWatch alarm. An adversary may delete alarms in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:monitoring.amazonaws.com and event.action:DeleteAlarms and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
Sample rules
AWS CloudWatch Log Group Deletion
- source: elastic
- technicques:
- T1485
- T1562
Description
Identifies the deletion of a specified AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted.
Detection logic
event.dataset:aws.cloudtrail and event.provider:logs.amazonaws.com and event.action:DeleteLogGroup and event.outcome:success
AWS SSM SendCommand
Execution by Rare User
- source: elastic
- technicques:
- T1651
Description
Detects the execution of commands or scripts on EC2 instances using AWS Systems Manager (SSM), such as RunShellScript
,
RunPowerShellScript
or custom documents. While legitimate users may employ these commands for management tasks, they
can also be exploited by attackers with credentials to establish persistence, install malware, or execute reverse shells
for further access to compromised instances. This is a New
Terms rule that looks for
the first instance of this behavior by the aws.cloudtrail.user_identity.arn
field in the last 7 days.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "SendCommand"
and event.outcome: "success"
and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*
AWS VPC Flow Logs Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:DeleteFlowLogs and event.outcome:success
AWS IAM Assume Role Policy Update
- source: elastic
- technicques:
- T1078
Description
Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role.
Detection logic
event.dataset:aws.cloudtrail and event.provider:iam.amazonaws.com and event.action:UpdateAssumeRolePolicy and event.outcome:success
AWS CloudWatch Alarm Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies the deletion of an AWS CloudWatch alarm. An adversary may delete alarms in an attempt to evade defenses.
Detection logic
event.dataset:aws.cloudtrail and event.provider:monitoring.amazonaws.com and event.action:DeleteAlarms and event.outcome:success
AWS Configuration Recorder Stopped
- source: elastic
- technicques:
- T1562
Description
Identifies an AWS configuration change to stop recording a designated set of resources.
Detection logic
event.dataset:aws.cloudtrail and event.provider:config.amazonaws.com and event.action:StopConfigurationRecorder and event.outcome:success
Suspicious Driver Install by pnputil.exe
- source: sigma
- technicques:
- t1547
Description
Detects when a possible suspicious driver is being installed via pnputil.exe lolbin
Detection logic
condition: selection
selection:
CommandLine|contains:
- -i
- /install
- -a
- /add-driver
- '.inf'
Image|endswith: \pnputil.exe
LOLBAS Data Exfiltration by DataSvcUtil.exe
- source: sigma
- technicques:
- t1567
Description
Detects when a user performs data exfiltration by using DataSvcUtil.exe
Detection logic
condition: all of selection*
selection_cli:
CommandLine|contains:
- '/in:'
- '/out:'
- '/uri:'
selection_img:
- Image|endswith: \DataSvcUtil.exe
- OriginalFileName: DataSvcUtil.exe
Okta Policy Modified or Deleted
- source: sigma
- technicques:
Description
Detects when an Okta policy is modified or deleted.
Detection logic
condition: selection
selection:
eventtype:
- policy.lifecycle.update
- policy.lifecycle.delete
Google Cloud VPN Tunnel Modified or Deleted
- source: sigma
- technicques:
Description
Identifies when a VPN Tunnel Modified or Deleted in Google Cloud.
Detection logic
condition: selection
selection:
gcp.audit.method_name:
- compute.vpnTunnels.insert
- compute.vpnTunnels.delete
Google Cloud SQL Database Modified or Deleted
- source: sigma
- technicques:
Description
Detect when a Cloud SQL DB has been modified or deleted.
Detection logic
condition: selection
selection:
gcp.audit.method_name:
- cloudsql.instances.create
- cloudsql.instances.delete
- cloudsql.users.update
- cloudsql.users.delete
AWS EKS Cluster Created or Deleted
- source: sigma
- technicques:
- t1485
Description
Identifies when an EKS cluster is created or deleted.
Detection logic
condition: selection
selection:
eventName:
- CreateCluster
- DeleteCluster
eventSource: eks.amazonaws.com
Azure Device or Configuration Modified or Deleted
- source: sigma
- technicques:
- t1485
- t1565
- t1565.001
Description
Identifies when a device or device configuration in azure is modified or deleted.
Detection logic
condition: selection
selection:
properties.message:
- Delete device
- Delete device configuration
- Update device
- Update device configuration
Azure Application Credential Modified
- source: sigma
- technicques:
Description
Identifies when a application credential is modified.
Detection logic
condition: selection
selection:
properties.message: Update application - Certificates and secrets management
Azure Suppression Rule Created
- source: sigma
- technicques:
Description
Identifies when a suppression rule is created in Azure. Adversary’s could attempt this to evade detection.
Detection logic
condition: selection
selection:
operationName: MICROSOFT.SECURITY/ALERTSSUPPRESSIONRULES/WRITE
Azure Service Principal Removed
- source: sigma
- technicques:
Description
Identifies when a service principal was removed in Azure.
Detection logic
condition: selection
selection:
properties.message: Remove service principal
Azure Keyvault Key Modified or Deleted
- source: sigma
- technicques:
- t1552
- t1552.001
Description
Identifies when a Keyvault Key is modified or deleted in Azure.
Detection logic
condition: selection
selection:
operationName:
- MICROSOFT.KEYVAULT/VAULTS/KEYS/UPDATE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/CREATE
- MICROSOFT.KEYVAULT/VAULTS/KEYS/CREATE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/IMPORT/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/RECOVER/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/RESTORE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/DELETE
- MICROSOFT.KEYVAULT/VAULTS/KEYS/BACKUP/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/PURGE/ACTION
Azure Application Gateway Modified or Deleted
- source: sigma
- technicques:
Description
Identifies when a application gateway is modified or deleted.
Detection logic
condition: selection
selection:
operationName:
- MICROSOFT.NETWORK/APPLICATIONGATEWAYS/WRITE
- MICROSOFT.NETWORK/APPLICATIONGATEWAYS/DELETE
Azure Application Security Group Modified or Deleted
- source: sigma
- technicques:
Description
Identifies when a application security group is modified or deleted.
Detection logic
condition: selection
selection:
operationName:
- MICROSOFT.NETWORK/APPLICATIONSECURITYGROUPS/WRITE
- MICROSOFT.NETWORK/APPLICATIONSECURITYGROUPS/DELETE
Azure Service Principal Created
- source: sigma
- technicques:
Description
Identifies when a service principal is created in Azure.
Detection logic
condition: selection
selection:
properties.message: Add service principal
Azure Key Vault Modified or Deleted
- source: sigma
- technicques:
- t1552
- t1552.001
Description
Identifies when a key vault is modified or deleted.
Detection logic
condition: selection
selection:
operationName:
- MICROSOFT.KEYVAULT/VAULTS/WRITE
- MICROSOFT.KEYVAULT/VAULTS/DELETE
- MICROSOFT.KEYVAULT/VAULTS/DEPLOY/ACTION
- MICROSOFT.KEYVAULT/VAULTS/ACCESSPOLICIES/WRITE
Azure Keyvault Secrets Modified or Deleted
- source: sigma
- technicques:
- t1552
- t1552.001
Description
Identifies when secrets are modified or deleted in Azure.
Detection logic
condition: selection
selection:
operationName:
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/WRITE
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/DELETE
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/BACKUP/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/PURGE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/UPDATE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/RECOVER/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/RESTORE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/SETSECRET/ACTION
Azure Application Deleted
- source: sigma
- technicques:
- t1489
Description
Identifies when a application is deleted in Azure.
Detection logic
condition: selection
selection:
properties.message:
- Delete application
- Hard Delete application
Azure Owner Removed From Application or Service Principal
- source: sigma
- technicques:
Description
Identifies when a owner is was removed from a application or service principal in Azure.
Detection logic
condition: selection
selection:
properties.message:
- Remove owner from service principal
- Remove owner from application
CA Policy Removed by Non Approved Actor
- source: sigma
- technicques:
- t1548
- t1556
Description
Monitor and alert on conditional access changes where non approved actor removed CA Policy.
Detection logic
condition: selection
selection:
properties.message: Delete conditional access policy
Azure Domain Federation Settings Modified
- source: sigma
- technicques:
- t1078
Description
Identifies when an user or application modified the federation settings on the domain.
Detection logic
condition: selection
selection:
ActivityDisplayName: Set federation settings on domain
New CA Policy by Non-approved Actor
- source: sigma
- technicques:
- t1548
Description
Monitor and alert on conditional access changes.
Detection logic
condition: selection
selection:
properties.message: Add conditional access policy
CA Policy Updated by Non Approved Actor
- source: sigma
- technicques:
- t1548
- t1556
Description
Monitor and alert on conditional access changes. Is Initiated by (actor) approved to make changes? Review Modified Properties and compare “old” vs “new” value.
Detection logic
condition: selection
selection:
properties.message: Update conditional access policy