
Summary
This rule detects when an IP address, domain, file hash, email, or other indicator present in log events matches a known threat indicator from AlienVault OTX pulse intelligence. It enriches matches with the corresponding pulses_otx data (pulse id, name, description, adversary, malware_families, indicators, references, and ATT&CK mappings) and raises the alert with elevated severity when the pulse includes a named adversary or known malware families. The rule monitors a broad set of log sources (e.g., AWS CloudTrail, Okta SystemLog, Cloudflare, GSuite, CrowdStrike FDREvent, etc.) to identify interactions with listed indicators and ties them to MITRE ATT&CK technique TA0043:T1595.001. It supports multi-indicator scenarios and assigns a DedupPeriodMinutes of 60 to suppress duplicates within an hour. This content is aimed at facilitating rapid triage and containment, including verifying context via the OTX Pulse URL, assessing related assets and services, and taking actions such as blocking indicators, isolating hosts, and resetting exposed credentials when malicious activity is confirmed.
Categories
- Network
- Cloud
- Web
- Application
- Infrastructure
- On-Premise
- AWS
- GCP
- Azure
- Identity Management
- Other
Data Sources
- Application Log
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1595.001
- T1071
- T1059
- T1595
- T1566
- T1566.002
Created: 2026-05-02