Suspicious command sent to EC2

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


An attacker with the necessary permissions could be executing code remotely on a machine and saving the output to his own S3 bucket. Verify this action with the user identity.

Attribute Value
Type Analytic Rule
Solution Amazon Web Services
ID 21702832-aff3-4bd6-a8e1-663b6818503d
Severity High
Status Available
Kind Scheduled
Tactics Execution
Techniques T1204
Required Connectors AWS
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AWSCloudTrail EventName in "CreateAssociation,PutObject,SendCommand" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Amazon Web Services