
Summary
The AWS Network Enumeration rule is designed to detect and identify suspicious AWS API calls associated with network enumeration activities. It leverages specific AWS CloudTrail logs to monitor API event calls such as DescribeCarrierGateways, DescribeVpcEndpointConnectionNotifications, DescribeTransitGatewayMulticastDomains, DescribeClientVpnRoutes, DescribeDhcpOptions, and GetTransitGatewayRouteTableAssociations. The logic processes the incoming data to group events by source IP within 90-second intervals, filtering to identify source IPs with more than two distinct event names indicating potential reconnaissance activities. The output includes critical information such as timestamps, host identifiers, user accounts, geographical locations, and associated AWS resources, thereby giving security analysts a comprehensive view of the potential enumeration attempts and the threat landscape within their AWS environment.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Network Traffic
- Process
ATT&CK Techniques
- T1049
- T1046
Created: 2024-02-09