Stealth Analytic Stories

Name Data Sources Tactics Products Date
VIP Keylogger windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688 Collection Command And Control Credential Access Defense Impairment Discovery Execution Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-04-16
Axios Supply Chain Post Compromise linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Linux Auditd Proctitle, Osquery Results, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Execution Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-03-31
Gh0st RAT windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log System 7045 Defense Impairment Discovery Execution Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-03-24
Void Manticore windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 3, Sysmon EventID 6, Sysmon EventID 9, Windows Event Log Security 4688, Windows Event Log System 7045 Discovery Execution Impact Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-03-16
QuietVault linux icon Linux Auditd Cwd, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Syscall Discovery Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-03-12
MuddyWater windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4688 Execution Impact Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-03-10
BlankGrabber Stealer windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-03-03
MacOS Post-Exploitation Osquery Results Defense Impairment Discovery Exfiltration Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-02-26
MacOS Persistence Techniques Osquery Results Defense Impairment Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-02-26
ZOVWiper windows icon CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Windows Event Log Security 4688 Credential Access Impact Lateral Movement Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-02-12
DynoWiper windows icon Sysmon EventID 11, Sysmon EventID 23, Sysmon EventID 26 Impact Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-02-12
SolarWinds WHD RCE Post Exploitation windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Command And Control Defense Impairment Discovery Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-02-09
Lotus Blossom Chrysalis Backdoor windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log System 7045 Discovery Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-02-03
XML Runner Loader windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688 Lateral Movement Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-02-03
Malicious PowerShell windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log System 7045 Command And Control Credential Access Defense Impairment Discovery Execution Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-01-22
Scattered Spider windows icon Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-01-22
VoidLink Cloud-Native Linux Malware linux icon Cisco Isovalent Process Connect, Cisco Isovalent Process Exec, Cisco Isovalent Process Kprobe, CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Path, Osquery Results, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Discovery Execution Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-01-20
Browser Hijacking windows icon CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Collection Discovery Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2026-01-12
PromptFlux windows icon Sysmon EventID 11, Sysmon EventID 22 Command And Control Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-12-17
StealC Stealer windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688 Collection Command And Control Credential Access Discovery Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-12-15
SesameOp windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4688 Command And Control Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-12-10
Tuoni windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log System 7045 Command And Control Execution Lateral Movement Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-12-04
NPM Supply Chain Compromise linux icon Cisco Isovalent Process Exec, Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, GitHub Enterprise Audit Logs, GitHub Organizations Audit Logs, Sysmon EventID 11, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Collection Command And Control Credential Access Defense Impairment Execution Impact Initial Access Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-11-25
Suspicious Cisco Adaptive Security Appliance Activity Cisco ASA Logs Collection Credential Access Defense Impairment Discovery Exfiltration Impact Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-11-19
NetSupport RMM Tool Abuse windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 14, Sysmon EventID 1, Sysmon EventID 29, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4688, Windows Event Log Security 4946, Windows Event Log Security 4947, Windows Event Log Security 4948 Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-11-14
Castle RAT windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702 Collection Defense Impairment Discovery Execution Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-10-31
Microsoft WSUS CVE-2025-59287 linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Command And Control Defense Impairment Discovery Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-10-24
Scattered Lapsus$ Hunters linux icon ASL AWS CloudTrail, AWS CloudTrail DeactivateMFADevice, AWS CloudTrail DeleteVirtualMFADevice, AWS CloudTrail DescribeEventAggregates, AWS CloudTrail ModifyDBInstance, AWS CloudWatchLogs VPCflow, Azure Active Directory Add member to role, Azure Active Directory Disable Strong Authentication, Azure Active Directory Enable account, Azure Active Directory Reset password (by admin), Azure Active Directory Set domain authentication, Azure Active Directory Update user, Azure Active Directory User registered security info, Azure Active Directory, Cisco IOS Logs, Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, G Suite Drive, Google Workspace login_failure, Google Workspace, Ivanti VTM Audit, Linux Auditd Execve, Nginx Access, O365 UserLoggedIn, O365 UserLoginFailed, Office 365 Universal Audit Log, Okta, Palo Alto Network Threat, Palo Alto Network Traffic, PingID, Powershell Script Block Logging 4104, Splunk Stream TCP, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon for Linux EventID 1, Windows Event Log Security 1100, Windows Event Log Security 4624, Windows Event Log Security 4625, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log Security 4720, Windows Event Log Security 4727, Windows Event Log Security 4731, Windows Event Log Security 4732, Windows Event Log Security 4744, Windows Event Log Security 4749, Windows Event Log Security 4754, Windows Event Log Security 4756, Windows Event Log Security 4759, Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4781, Windows Event Log Security 4783, Windows Event Log Security 4790, Windows Event Log Security 4794, Windows Event Log System 7036 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-10-14
Hellcat Ransomware linux icon AWS CloudTrail CreateTask, Azure Active Directory Set domain authentication, Azure Active Directory Update user, Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense File Event, CrowdStrike ProcessRollup2, CrushFTP, Ivanti VTM Audit, Linux Auditd Execve, Nginx Access, Osquery Results, Palo Alto Network Threat, Powershell Script Block Logging 4104, Splunk Stream HTTP, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 20, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 5, Sysmon EventID 7, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, VMWare ESXi Syslog, Windows Event Log Application 17135, Windows Event Log CAPI2 70, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145, Windows Event Log System 7036, Windows Event Log System 7045 Collection Command And Control Credential Access Defense Impairment Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-10-14
Lokibot windows icon CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703 Collection Command And Control Credential Access Discovery Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-09-30
Suspicious Microsoft 365 Copilot Activities M365 Copilot Graph API, M365 Exported eDiscovery Prompts Credential Access Defense Impairment Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-09-24
ArcaneDoor Cisco ASA Logs, Cisco Secure Firewall Threat Defense Intrusion Event Collection Command And Control Credential Access Defense Impairment Discovery Exfiltration Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-09-23
GhostRedirector IIS Module and Rungan Backdoor linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Nginx Access, Powershell Installed IIS Modules, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 3, Sysmon for Linux EventID 1, Windows Event Log Application 15457, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log Security 4720, Windows Event Log System 4720, Windows Event Log System 4726, Windows IIS 29 Command And Control Defense Impairment Execution Exfiltration Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-09-18
APT37 Rustonotto and FadeStealer linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Osquery Results, Powershell Script Block Logging 4104, Splunk Stream HTTP, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 3, Sysmon EventID 6, Sysmon EventID 7, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log System 7045 Collection Command And Control Credential Access Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-09-18
PromptLock windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Windows Event Log Security 4688 Command And Control Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-09-09
0bj3ctivity Stealer windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702 Command And Control Credential Access Discovery Execution Exfiltration Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-08-22
Cisco Smart Install Remote Code Execution CVE-2018-0171 splunk icon Cisco IOS Logs, Cisco Secure Firewall Threat Defense Intrusion Event, Splunk Stream TCP Collection Credential Access Defense Impairment Discovery Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-08-21
PathWiper windows icon CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 9, Windows Event Log Security 4688, Windows Event Log Security 4703 Impact Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-08-20
China-Nexus Threat Activity linux icon AWS CloudWatchLogs VPCflow, Cisco Network Visibility Module Flow Data, Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Syscall, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, VMWare ESXi Syslog, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log System 7045 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-08-18
MSIX Package Abuse windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log AppXDeployment-Server 400, Windows Event Log AppXDeployment-Server 854, Windows Event Log AppXDeployment-Server 855, Windows Event Log AppXPackaging 171, Windows Event Log Security 4688 Defense Impairment Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-08-05
Windows RDP Artifacts and Defense Evasion windows icon Cisco Secure Access Firewall, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 3, Windows Event Log Microsoft Windows TerminalServices RDPClient 1024, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4624, Windows Event Log Security 4688, Zeek Conn Credential Access Defense Impairment Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-07-30
NailaoLocker Ransomware windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Sysmon EventID 7, Windows Event Log Security 4688 Execution Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-07-29
Interlock Rat windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688 Command And Control Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-07-28
Interlock Ransomware windows icon Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Palo Alto Network Threat, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Sysmon EventID 6, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4688, Windows Event Log Security 5136 Command And Control Credential Access Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-07-28
Microsoft SharePoint Vulnerabilities linux icon CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 11, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Credential Access Initial Access Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-07-20
Quasar RAT windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702 Credential Access Defense Impairment Discovery Execution Impact Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-07-16
Cisco Network Visibility Module Analytics windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688 Command And Control Credential Access Discovery Execution Exfiltration Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-07-01
Remote Employment Fraud Okta Collection Command And Control Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-06-02
Malicious Inno Setup Loader windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-05-25
Fake CAPTCHA Campaigns windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688 Command And Control Execution Exfiltration Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-05-14
ESXi Post Compromise windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, VMWare ESXi Syslog, Windows Event Log Security 4688 Collection Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-05-08
XWorm windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698 Command And Control Defense Impairment Execution Impact Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-05-06
SAP NetWeaver Exploitation linux icon Suricata, Sysmon EventID 10, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1 Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-04-28
Water Gamayun windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4798 Collection Command And Control Credential Access Discovery Execution Exfiltration Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-04-17
Storm-2460 CLFS Zero Day Exploitation windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Execution Impact Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-04-16
Earth Alux windows icon CrowdStrike ProcessRollup2, Nginx Access, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4663, Windows Event Log Security 4688 Discovery Execution Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-04-16
Cisco Secure Firewall Threat Defense Analytics aws icon AWS CloudWatchLogs VPCflow, Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, Cisco Secure Firewall Threat Defense File Event, Cisco Secure Firewall Threat Defense Intrusion Event, Palo Alto Network Traffic Command And Control Credential Access Discovery Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-04-03
Seashell Blizzard windows icon CrowdStrike ProcessRollup2, Nginx Access, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Application 15457, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows IIS Command And Control Credential Access Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-03-24
Salt Typhoon linux icon Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Intrusion Event, CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log System 7045 Collection Command And Control Credential Access Defense Impairment Discovery Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-03-19
Cactus Ransomware windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Windows Event Log Security 4688, Windows Event Log Security 4698 Command And Control Credential Access Defense Impairment Execution Exfiltration Impact Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-03-18
PHP-CGI RCE Attack on Japanese Organizations linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Command And Control Credential Access Discovery Execution Initial Access Persistence Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-03-17
Medusa Ransomware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4728, Windows Event Log Security 4946, Windows Event Log Security 4947, Windows Event Log Security 4948 Command And Control Defense Impairment Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-03-14
SystemBC windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-02-28
SnappyBee windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703 Credential Access Defense Impairment Discovery Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-02-07
Black Basta Ransomware windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 7, VMWare ESXi Syslog, Windows Event Log Printservice 316, Windows Event Log Printservice 4909, Windows Event Log Printservice 808, Windows Event Log Security 4688 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-02-03
WinDealer RAT windows icon Sysmon EventID 11, Sysmon EventID 13, Windows Event Log Security 4703 Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-01-27
Derusbi windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log System 7045 Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-01-27
Remote Monitoring and Management Software windows icon Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Palo Alto Network Threat, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4688, Windows Event Log Security 4698 Command And Control Execution Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2025-01-14
XorDDos linux icon Linux Auditd Cwd, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Syscall, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1 Command And Control Credential Access Defense Impairment Discovery Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-12-17
Crypto Stealer windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 5, Sysmon EventID 6, Windows Event Log Security 4624, Windows Event Log Security 4625, Windows Event Log Security 4688, Windows Event Log System 7045 Collection Command And Control Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-12-17
CISA AA23-347A windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4699, Windows Event Log Security 4703, Windows Event Log System 7040, Windows Event Log System 7045 Collection Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-12-09
Defense Evasion or Unauthorized Access Via SDDL Tampering windows icon CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Defense Impairment Execution Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-12-06
Meduza Stealer windows icon CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703 Command And Control Credential Access Discovery Execution Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-11-28
Lumma Stealer windows icon Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Intrusion Event, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4688 Command And Control Execution Exfiltration Initial Access Lateral Movement Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-11-13
CISA AA24-241A windows icon CrowdStrike ProcessRollup2, Palo Alto Network Threat, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 14, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4648, Windows Event Log Security 4688, Windows Event Log Security 4720, Windows Event Log Security 4732, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201, Windows IIS Command And Control Defense Impairment Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-10-07
Windows Defense Evasion Tactics windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log System 7040 Credential Access Defense Impairment Discovery Execution Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
AWS IAM Privilege Escalation aws icon ASL AWS CloudTrail, AWS CloudTrail ConsoleLogin, AWS CloudTrail CreateAccessKey, AWS CloudTrail CreateLoginProfile, AWS CloudTrail CreatePolicyVersion, AWS CloudTrail DeleteAccountPasswordPolicy, AWS CloudTrail DeleteGroup, AWS CloudTrail DeletePolicy, AWS CloudTrail GetAccountPasswordPolicy, AWS CloudTrail SetDefaultPolicyVersion, AWS CloudTrail UpdateAccountPasswordPolicy, AWS CloudTrail UpdateLoginProfile, AWS CloudTrail Credential Access Discovery Initial Access Persistence Privilege Escalation Stealth Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
Emotet Malware DHS Report TA18-201A windows icon CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
Azure Active Directory Persistence windows icon Azure Active Directory Add member to role, Azure Active Directory Add owner to application, Azure Active Directory Add service principal, Azure Active Directory Add unverified domain, Azure Active Directory Consent to application, Azure Active Directory Enable account, Azure Active Directory Invite external user, Azure Active Directory Reset password (by admin), Azure Active Directory Set domain authentication, Azure Active Directory Update application, Azure Active Directory Update user, Azure Active Directory, Azure Audit Create or Update an Azure Automation Runbook, Azure Audit Create or Update an Azure Automation account, Azure Audit Create or Update an Azure Automation webhook, CrowdStrike ProcessRollup2, Office 365 Universal Audit Log, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4724, Windows Event Log Security 4725, Windows Event Log Security 4726 Command And Control Credential Access Defense Impairment Discovery Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
Suspicious AWS Login Activities aws icon AWS CloudTrail ConsoleLogin, AWS CloudTrail Resource Development Stealth Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
Collection and Staging windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Windows Event Log Security 4688 Collection Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
Suspicious Cloud Authentication Activities aws icon AWS CloudTrail Credential Access Resource Development Stealth Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
Suspicious Regsvcs Regasm Activity windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688 Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-24
ValleyRAT windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Defense Impairment Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-09-11
BlackSuit Ransomware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 8, Windows Event Log Security 4662, Windows Event Log Security 4688, Windows Event Log Security 4738, Windows Event Log Security 5145, Windows Event Log System 7045, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Collection Command And Control Credential Access Discovery Execution Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-08-26
MoonPeak windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688 Command And Control Discovery Execution Impact Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-08-21
Handala Wiper windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 3, Windows Event Log Security 4688 Execution Impact Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-07-31
Gozi Malware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4627, Windows Event Log Security 4688 Command And Control Credential Access Discovery Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-07-24
Compromised Linux Host linux icon Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Daemon Abort, Linux Auditd Daemon End, Linux Auditd Daemon Start, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-06-25
Compromised Windows Host linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 7, Sysmon for Linux EventID 1, Windows Event Log Security 1102, Windows Event Log Security 4624, Windows Event Log Security 4627, Windows Event Log Security 4662, Windows Event Log Security 4663, Windows Event Log Security 4672, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4699, Windows Event Log Security 4738, Windows Event Log Security 4741, Windows Event Log Security 4742, Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4781, Windows Event Log Security 4798, Windows Event Log Security 4887, Windows Event Log Security 5136, Windows Event Log Security 5137, Windows Event Log Security 5141, Windows Event Log Security 5145, Windows Event Log System 104, Windows Event Log System 7036, Windows Event Log System 7040, Windows Event Log System 7045 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-04-18
AcidPour linux icon Sysmon EventID 11, Sysmon for Linux EventID 11 Impact Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-04-01
APT29 Diplomatic Deceptions with WINELOADER windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688 Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-03-26
Windows AppLocker Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-03-21
Cyclops Blink linux icon Sysmon for Linux EventID 1 Defense Impairment Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-03-14
Sneaky Active Directory Persistence Tricks windows icon CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Active Directory Admon, Windows Event Log Security 4624, Windows Event Log Security 4662, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4720, Windows Event Log Security 4728, Windows Event Log Security 4738, Windows Event Log Security 4742, Windows Event Log Security 4794, Windows Event Log Security 5136, Windows Event Log Security 5137, Windows Event Log Security 5141 Credential Access Defense Impairment Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-03-14
Okta Account Takeover Okta Credential Access Defense Impairment Discovery Initial Access Lateral Movement Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-03-06
Snake Keylogger windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 5, Sysmon EventID 6, Windows Event Log Security 4663, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Discovery Execution Impact Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-02-12
Office 365 Collection Techniques O365 Add-MailboxPermission, O365 MailItemsAccessed, O365 ModifyFolderPermissions, O365, Office 365 Reporting Message Trace, Office 365 Universal Audit Log Collection Credential Access Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-02-12
Phemedrone Stealer windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688 Command And Control Credential Access Discovery Execution Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-01-24
Splunk Vulnerabilities splunk icon Splunk Credential Access Discovery Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2024-01-22
Rhysida Ransomware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 5, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log System 7045 Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-12-12
DarkGate Malware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703 Collection Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-10-31
Office 365 Account Takeover O365 Add app role assignment grant to user., O365 Consent to application., O365 Update authorization policy., O365 UserLoggedIn, O365 UserLoginFailed, O365, Office 365 Reporting Message Trace, Office 365 Universal Audit Log Collection Credential Access Defense Impairment Execution Exfiltration Impact Initial Access Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-10-17
PlugX windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log System 7045, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-10-12
Forest Blizzard windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Command And Control Discovery Execution Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-09-11
NjRAT windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon EventID 9, Windows Event Log Security 4663, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-09-07
Flax Typhoon linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log System 7045 Command And Control Credential Access Execution Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-08-25
Windows Error Reporting Service Elevation of Privilege Vulnerability windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698 Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-08-24
Warzone RAT windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4663, Windows Event Log Security 4688 Credential Access Defense Impairment Discovery Execution Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-07-26
BlackByte Ransomware linux icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 3, Sysmon EventID 5, Sysmon EventID 6, Sysmon EventID 7, Sysmon EventID 9, Sysmon for Linux EventID 1, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4688, Windows Event Log System 7045, Windows IIS Collection Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-07-10
Amadey windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Defense Impairment Discovery Execution Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-06-16
Graceful Wipe Out Attack windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 8, Sysmon EventID 9, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 5145 Collection Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-06-15
Scheduled Tasks linux icon CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Syscall, Powershell Script Block Logging 4104, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4699, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Defense Impairment Execution Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-06-12
Volt Typhoon windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4625, Windows Event Log Security 4648, Windows Event Log Security 4688, Windows Event Log Security 4768, Windows Event Log Security 4771, Windows Event Log Security 4776 Command And Control Credential Access Defense Impairment Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-05-25
Data Exfiltration linux icon ASL AWS CloudTrail, AWS CloudTrail CreateSnapshot, AWS CloudTrail CreateTask, AWS CloudTrail DeleteSnapshot, AWS CloudTrail DescribeSnapshotAttribute, AWS CloudTrail GetObject, AWS CloudTrail JobCreated, AWS CloudTrail ModifyImageAttribute, AWS CloudTrail ModifySnapshotAttribute, AWS CloudTrail PutBucketReplication, AWS CloudTrail PutBucketVersioning, Cisco Isovalent Process Exec, CrowdStrike ProcessRollup2, Nginx Access, O365, Office 365 Universal Audit Log, Powershell Script Block Logging 4104, Splunk Stream HTTP, Sysmon EventID 11, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Collection Command And Control Credential Access Exfiltration Impact Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-05-17
Snake Malware windows icon Sysmon EventID 11, Sysmon EventID 13, Windows Event Log System 7045 Defense Impairment Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-05-10
Windows BootKits windows icon Sysmon EventID 11, Sysmon EventID 13 Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-05-03
Azure Active Directory Privilege Escalation windows icon Azure Active Directory Add app role assignment to service principal, Azure Active Directory Add member to role, Azure Active Directory Add owner to application, Azure Active Directory MicrosoftGraphActivityLogs, Azure Active Directory NonInteractiveUserSignInLogs, Azure Active Directory, O365 Add app role assignment grant to user., Office 365 Universal Audit Log, Powershell Script Block Logging 4104 Command And Control Credential Access Discovery Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-04-24
RedLine Stealer windows icon CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log System 7040 Command And Control Credential Access Defense Impairment Discovery Execution Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-04-24
BlackLotus Campaign windows icon Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3 Defense Impairment Impact Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-04-14
Data Destruction linux icon AWS Cloudfront, Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Linux Auditd Execve, Linux Auditd Proctitle, Linux Auditd Service Stop, Office 365 Reporting Message Trace, Office 365 Universal Audit Log, Osquery Results, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Sysmon EventID 7, Sysmon EventID 9, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4769, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Collection Command And Control Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-04-06
Active Directory Privilege Escalation windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Active Directory Admon, Windows Event Log Security 4624, Windows Event Log Security 4625, Windows Event Log Security 4627, Windows Event Log Security 4672, Windows Event Log Security 4688, Windows Event Log Security 4728, Windows Event Log Security 4732, Windows Event Log Security 4742, Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4781, Windows Event Log Security 5136, Windows Event Log Security 5137, Windows Event Log Security 5140, Windows Event Log Security 5145 Collection Credential Access Defense Impairment Discovery Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-03-20
Winter Vivern windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Collection Command And Control Discovery Execution Exfiltration Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-02-16
Swift Slicer windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Windows Event Log Security 4688 Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-02-01
BishopFox Sliver Adversary Emulation Framework windows icon CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 10, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log System 7045 Command And Control Execution Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-01-24
AsyncRAT windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Execution Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-01-24
AwfulShred linux icon Linux Auditd Execve, Linux Auditd Proctitle, Linux Auditd Service Stop, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1 Defense Impairment Execution Impact Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-01-24
Compromised User Account windows icon ASL AWS CloudTrail, AWS CloudTrail ConsoleLogin, AWS CloudTrail DeleteAccountPasswordPolicy, AWS CloudTrail DescribeEventAggregates, AWS CloudTrail GetAccountPasswordPolicy, AWS CloudTrail UpdateAccountPasswordPolicy, AWS CloudTrail, Azure Active Directory MicrosoftGraphActivityLogs, Azure Active Directory NonInteractiveUserSignInLogs, Azure Active Directory Sign-in activity, Azure Active Directory User registered security info, Azure Active Directory, Cisco Secure Access Firewall, Office 365 Universal Audit Log, PingID, Sysmon EventID 3, Windows Event Log Security 4624, Windows Event Log Security 4625 Collection Credential Access Defense Impairment Discovery Initial Access Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-01-19
LockBit Ransomware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 5, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log System 7036 Defense Impairment Execution Impact Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-01-16
Chaos Ransomware windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2023-01-11
Prestige Ransomware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Collection Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-11-30
Windows Post-Exploitation windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688 Collection Command And Control Credential Access Defense Impairment Discovery Execution Impact Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-11-30
CISA AA22-320A windows icon CrowdStrike ProcessRollup2, Nginx Access, Office 365 Universal Audit Log, Powershell Script Block Logging 4104, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 6, Windows Event Log Security 4688, Windows Event Log System 7045 Collection Command And Control Credential Access Defense Impairment Discovery Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-11-16
Qakbot windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log System 7045, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Command And Control Defense Impairment Discovery Execution Impact Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-11-14
GCP Account Takeover Google Workspace login_failure, Google Workspace Credential Access Defense Impairment Initial Access Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-10-12
CISA AA22-277A windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Security 4688 Collection Command And Control Defense Impairment Discovery Execution Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-10-05
CISA AA22-264A linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 9, Sysmon for Linux EventID 1, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log System 104 Credential Access Defense Impairment Execution Impact Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-09-22
Brute Ratel C4 windows icon CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log System 7045 Collection Command And Control Credential Access Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-08-23
AWS Identity and Access Management Account Takeover aws icon ASL AWS CloudTrail, AWS CloudTrail ConsoleLogin, AWS CloudTrail CreateVirtualMFADevice, AWS CloudTrail DeactivateMFADevice, AWS CloudTrail DeleteVirtualMFADevice, AWS CloudTrail DescribeEventAggregates, AWS CloudTrail GetPasswordData, AWS CloudTrail ModifyDBInstance, AWS CloudTrail Collection Credential Access Defense Impairment Discovery Initial Access Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-08-19
Linux Living Off The Land linux icon Cisco Isovalent Process Exec, CrowdStrike ProcessRollup2, Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-07-27
Linux Rootkit linux icon Linux Auditd Syscall, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1 Command And Control Discovery Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-07-27
DarkCrystal RAT windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Command And Control Defense Impairment Discovery Execution Impact Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-07-26
Azure Active Directory Account Takeover windows icon Azure Active Directory Consent to application, Azure Active Directory Disable Strong Authentication, Azure Active Directory Sign-in activity, Azure Active Directory Update authorization policy, Azure Active Directory User registered security info, Azure Active Directory, Azure Monitor Activity, Office 365 Universal Audit Log, Powershell Script Block Logging 4104 Collection Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-07-14
Windows System Binary Proxy Execution MSIExec windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688 Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-06-16
Azorult windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-06-09
Microsoft Support Diagnostic Tool Vulnerability CVE-2022-30190 windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Execution Initial Access Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-05-31
Insider Threat linux icon Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, G Suite Drive, G Suite Gmail, Linux Secure, Palo Alto Network Threat, Palo Alto Network Traffic, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4625, Windows Event Log Security 4648, Windows Event Log Security 4688, Windows Event Log Security 5145 Command And Control Credential Access Execution Exfiltration Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud, Splunk Behavioral Analytics 2022-05-19
Industroyer2 linux icon CrowdStrike ProcessRollup2, Linux Auditd Proctitle, Linux Auditd Service Stop, Osquery Results, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 5, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Credential Access Defense Impairment Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-04-21
AgentTesla windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 6, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log System 7045 Command And Control Credential Access Defense Impairment Execution Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-04-12
AcidRain linux icon Sysmon for Linux EventID 11 Impact Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-04-12
Sandworm Tools linux icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Credential Access Defense Impairment Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-04-05
Windows Drivers windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 6, Windows Event Log Security 4688, Windows Event Log System 7045 Defense Impairment Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-03-30
Double Zero Destructor windows icon CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 1, Windows Event Log Security 4688 Defense Impairment Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-03-25
Windows Registry Abuse windows icon CrowdStrike ProcessRollup2, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Command And Control Credential Access Defense Impairment Execution Impact Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-03-17
Living Off The Land linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Osquery Results, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 7, Sysmon EventID 8, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145 Command And Control Credential Access Defense Impairment Execution Exfiltration Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-03-16
Hermetic Wiper linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Sysmon EventID 9, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4769, Windows Event Log Security 5145 Command And Control Credential Access Defense Impairment Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-03-02
Active Directory Kerberos Attacks windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4624, Windows Event Log Security 4627, Windows Event Log Security 4688, Windows Event Log Security 4738, Windows Event Log Security 4741, Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4771, Windows Event Log Security 4781 Credential Access Discovery Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-02-02
WhisperGate windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 9, Windows Event Log Security 4688 Defense Impairment Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2022-01-19
sAMAccountName Spoofing and Domain Controller Impersonation windows icon Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4781 Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-12-20
Linux Persistence Techniques linux icon Cisco Isovalent Process Exec, Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1 Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-12-17
Linux Privilege Escalation linux icon Cisco Isovalent Process Exec, Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1 Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-12-17
Active Directory Lateral Movement windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4624, Windows Event Log Security 4625, Windows Event Log Security 4672, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4699, Windows Event Log Security 4769, Windows Event Log Security 5140, Windows Event Log Security 5145, Windows Event Log System 4720, Windows Event Log System 4726, Windows Event Log System 7045, Zeek Conn Credential Access Discovery Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-12-09
Signed Binary Proxy Execution InstallUtil windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log Security 4688 Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-11-12
Remcos windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Collection Credential Access Defense Impairment Execution Initial Access Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-09-23
FIN7 windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688 Credential Access Defense Impairment Discovery Execution Impact Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-09-14
Microsoft MSHTML Remote Code Execution CVE-2021-40444 windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688 Initial Access Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-09-08
Active Directory Discovery windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4662, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log System 7045 Collection Credential Access Discovery Execution Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-08-20
IcedID windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5140, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Collection Command And Control Defense Impairment Discovery Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-07-29
PrintNightmare CVE-2021-34527 windows icon CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log Printservice 316, Windows Event Log Printservice 4909, Windows Event Log Printservice 808, Windows Event Log Security 4688 Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-07-01
Meterpreter windows icon CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4688 Command And Control Execution Lateral Movement Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-06-08
Revil Ransomware windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688 Defense Impairment Execution Impact Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-06-04
DarkSide Ransomware windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688 Command And Control Credential Access Execution Exfiltration Impact Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-05-12
XMRig windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 6, Windows Event Log Security 4688, Windows Event Log Security 4798 Command And Control Credential Access Defense Impairment Discovery Execution Exfiltration Impact Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-05-07
Masquerading - Rename System Utilities windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Execution Impact Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-04-26
Trickbot windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145 Defense Impairment Execution Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-04-20
Active Directory Password Spraying windows icon Azure Active Directory Sign-in activity, NTLM Operational 8004, NTLM Operational 8005, NTLM Operational 8006, Windows Event Log Security 4625, Windows Event Log Security 4648, Windows Event Log Security 4720, Windows Event Log Security 4768, Windows Event Log Security 4771, Windows Event Log Security 4776 Credential Access Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-04-07
BITS Jobs windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Command And Control Execution Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-03-26
Ingress Tool Transfer linux icon Cisco Isovalent Process Exec, Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688 Collection Command And Control Credential Access Execution Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-03-24
Deobfuscate-Decode Files or Information windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Execution Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-03-24
Clop Ransomware windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Windows Event Log Security 1100, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log System 104, Windows Event Log System 7045 Defense Impairment Execution Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-03-17
HAFNIUM Group linux icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4720, Windows Event Log Security 4732 Collection Command And Control Credential Access Execution Initial Access Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-03-03
Cobalt Strike windows icon CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688 Collection Command And Control Execution Lateral Movement Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-02-16
Suspicious Compiled HTML Activity windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-02-11
Suspicious Rundll32 Activity windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688 Credential Access Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-02-03
Suspicious Regsvr32 Activity windows icon CrowdStrike ProcessRollup2, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Defense Impairment Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-01-29
Cloud Federated Credential Abuse windows icon ASL AWS CloudTrail, AWS CloudTrail UpdateSAMLProvider, CrowdStrike ProcessRollup2, O365 Add app role assignment grant to user., O365 UserLoginFailed, O365, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Credential Access Defense Impairment Initial Access Persistence Privilege Escalation Stealth Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-01-26
Trusted Developer Utilities Proxy Execution MSBuild windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Execution Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-01-21
Suspicious MSHTA Activity windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-01-20
Trusted Developer Utilities Proxy Execution windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Execution Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2021-01-12
NOBELIUM Group windows icon Azure Active Directory Add app role assignment to service principal, Azure Active Directory Add member to role, Azure Active Directory Add owner to application, Azure Active Directory Add service principal, Azure Active Directory Consent to application, Azure Active Directory Sign-in activity, Azure Active Directory Update application, Azure Active Directory, Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, O365 Add owner to application., O365 Add service principal., O365 Consent to application., O365 MailItemsAccessed, O365 Update application., O365 UserLoginFailed, O365, Palo Alto Network Traffic, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log System 7036 Collection Command And Control Credential Access Discovery Execution Initial Access Persistence Privilege Escalation Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-12-14
Ryuk Ransomware windows icon Cisco Secure Access Firewall, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Zeek Conn Credential Access Defense Impairment Discovery Execution Impact Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-11-06
Suspicious Cloud User Activities aws icon ASL AWS CloudTrail, AWS CloudTrail Defense Impairment Discovery Execution Initial Access Persistence Privilege Escalation Stealth Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-09-04
Suspicious Okta Activity Okta Command And Control Credential Access Discovery Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-04-02
Credential Dumping linux icon CrowdStrike ProcessRollup2, Linux Secure, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 8, Windows Event Log Security 4624, Windows Event Log Security 4662, Windows Event Log Security 4663, Windows Event Log Security 4688 Credential Access Defense Impairment Execution Impact Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-02-04
Windows Privilege Escalation windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4769 Credential Access Defense Impairment Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-02-04
Ransomware windows icon Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Palo Alto Network Threat, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 1100, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log System 104, Windows Event Log System 7036 Collection Command And Control Defense Impairment Discovery Execution Exfiltration Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-02-04
Unusual Processes windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688 Credential Access Defense Impairment Discovery Execution Initial Access Persistence Privilege Escalation Reconnaissance Resource Development Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-02-04
Suspicious Command-Line Executions windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Execution Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-02-03
Suspicious Emails Office 365 Reporting Message Trace, Office 365 Universal Audit Log Collection Impact Initial Access Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-01-27
DHS Report TA18-074A windows icon Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4720, Windows Event Log Security 4732 Command And Control Defense Impairment Execution Lateral Movement Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-01-22
Hidden Cobra Malware windows icon Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4688, Zeek Conn Command And Control Execution Exfiltration Lateral Movement Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2020-01-22
Cloud Cryptomining aws icon AWS CloudTrail Defense Impairment Initial Access Persistence Privilege Escalation Stealth Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2019-10-02
Spearphishing Attachments windows icon CrowdStrike ProcessRollup2, Office 365 Universal Audit Log, Suricata, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Microsoft Windows TerminalServices RDPClient 1024, Windows Event Log Security 4688 Collection Command And Control Credential Access Execution Initial Access Lateral Movement Persistence Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2019-04-29
SamSam Ransomware windows icon Cisco Network Visibility Module Flow Data, Cisco Secure Access Firewall, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688, Zeek Conn Credential Access Discovery Execution Impact Initial Access Lateral Movement Persistence Privilege Escalation Reconnaissance Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2018-12-13
Suspicious WMI Use windows icon Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Sysmon EventID 20, Sysmon EventID 21, Windows Event Log Security 4688 Execution Impact Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2018-10-23
Suspicious Cloud Provisioning Activities aws icon AWS CloudTrail Initial Access Persistence Privilege Escalation Stealth Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2018-08-20
Command And Control windows icon Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Palo Alto Network Threat, Palo Alto Network Traffic, Splunk Stream HTTP, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4688 Command And Control Execution Exfiltration Initial Access Lateral Movement Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2018-06-01
Suspicious Windows Registry Activities windows icon Sysmon EventID 13 Defense Impairment Execution Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2018-05-31
Windows Persistence Techniques windows icon CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 14, Sysmon EventID 1, Windows Event Log Application 3000, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log Security 4738, Windows Event Log Security 4742, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201 Credential Access Defense Impairment Execution Initial Access Persistence Privilege Escalation Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2018-05-31
Windows File Extension and Association Abuse windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688 Execution Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2018-01-26
Windows Log Manipulation windows icon CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 1100, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log System 104 Defense Impairment Impact Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2017-09-12
Router and Infrastructure Security Cisco IOS Logs Collection Credential Access Exfiltration Impact Initial Access Persistence Stealth Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud 2017-09-12