Xero
Communication and Collaboration
Xero - Cloud-based accounting software for small businesses.
Detection Rules for Xero
These detection rules will focus on various aspects of Xero such as cloud-based accounting software for small businesses.
Provider: Xero
| Detection Rule | MITRE Tactic | MITRE Technique | Criticality | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Unauthorized Access Attempts | Initial Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
| Suspicious Invoice Generation | Execution | T1059: Command and Scripting Interpreter | High | ||||||
|
|||||||||
| Alteration of Payroll Information | Privilege Escalation | T1068: Execution with Unprivileged Software | High | ||||||
|
|||||||||
| Unusual Expense Claims | Exfiltration | T1001: Data Obfuscation | Medium | ||||||
|
|||||||||
| Multiple Login Attempts from Different Locations | Initial Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
| Unapproved Data Exports | Command and Control | T1071: Application Layer Protocol | Medium | ||||||
|
|||||||||
| Suspicious User Account Changes | Persistence | T1136: Create Account | Medium | ||||||
|
|||||||||
| Malicious Software Installation | Execution | T1195: Supply Chain Compromise | High | ||||||
|
|||||||||
| Increased Volume of Transactions | Execution | T1203: Exploitation for Client Execution | High | ||||||
|
|||||||||
| Anomalies in Reconciliation Processes | Impact | T1481: Data Manipulation | High | ||||||
|
|||||||||
APIs and Their Scopes
| App: Xero | API Required | Scope Required | Usage |
|---|---|---|---|
| Unauthorized Access Attempts | Login Activity API | com.xero.loginactivity.read | To monitor and retrieve user login attempts and status. |
| Suspicious Invoice Generation | Invoice API | com.xero.invoice.read | To fetch recently created or modified invoices for review. |
| Alteration of Payroll Information | Payroll API | com.xero.payroll.readwrite | To check for changes in payroll information and validate permissions. |
| Unusual Expense Claims | Expense Claims API | com.xero.expenseclaims.readwrite | To retrieve and analyze expense claims for anomalies. |
| Multiple Login Attempts from Different Locations | Login Activity API | com.xero.loginactivity.read | To analyze login locations and detect unusual patterns. |
| Unapproved Data Exports | Data Export API | com.xero.dataexport.read | To monitor and retrieve records of data exports. |
| Suspicious User Account Changes | User Management API | com.xero.usermanagement.readwrite | To track modifications to user accounts and permissions. |
| Malicious Software Installation | Software Inventory API | com.xero.softwareinventory.read | To check installed applications and verify their legitimacy. |
| Increased Volume of Transactions | Transaction Monitoring API | com.xero.transactionmonitoring.read | To analyze transaction volumes for unusual activity. |
| Anomalies in Reconciliation Processes | Reconciliation API | com.xero.reconciliation.readwrite | To monitor and validate reconciliation processes for discrepancies. |
Reports and Widgets for CISO
| Report Name | Widgets | Description |
|---|---|---|
| User Access and Activity Report | Total Logins | Overview of user logins, access levels, and activity patterns. |
|
Unique Users Failed Login Attempts Last Access Timestamp |
||
| Invoice Generation and Approval Report | Total Invoices Created | Track invoice creation, modifications, and approvals. |
|
Invoices Pending Approval High-Value Invoices Recent Modifications |
||
| Expense Claims Overview | Total Claims Submitted | Summary of all expense claims submitted and their statuses. |
|
Claims by Category Pending Approvals Anomalies Detected |
||
| Payroll Changes Report | Total Changes | Overview of changes made to payroll information. |
|
Users Who Made Changes Changes by Time Period Alerts for Unusual Modifications |
||
| Data Export Activity Report | Total Exports | Monitor data export activities and compliance. |
|
Exports by User Recent Export Actions Unapproved Exports |
||
| User Account Modifications Report | Total Modifications | Details of changes made to user accounts and permissions. |
|
Users with Changed Permissions Recent Additions/Deletions Alerts for Unauthorized Changes |
||
| Transaction Volume Report | Total Transactions | Analyze transaction volumes and identify anomalies. |
|
Transactions by Category Anomalies Detected Comparison with Historical Data |
||
| Software Installation and Compliance Report | Total Software Installed | Overview of installed applications and compliance status. |
|
Recent Installations Compliance Status of Applications Alerts for Unauthorized Software |
||
| Reconciliation Status Report | Total Reconciliations | Monitor the status of reconciliation processes and discrepancies. |
|
Reconciliations by Status Discrepancies Detected Alerts for Unusual Patterns |
||
| Risk Assessment and Incident Summary Report | Total Incidents Logged | Summary of identified risks and incidents related to Xero usage. |
|
Risks Identified Incident Severity Levels Recent Alerts |

































