Xero
Communication and Collaboration
Xero - Cloud-based accounting software for small businesses.
Detection Rules for Xero
These detection rules will focus on various aspects of Xero such as cloud-based accounting software for small businesses.
Provider: Xero
Detection Rule | MITRE Tactic | MITRE Technique | Criticality | ||||||
---|---|---|---|---|---|---|---|---|---|
Unauthorized Access Attempts | Initial Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
Suspicious Invoice Generation | Execution | T1059: Command and Scripting Interpreter | High | ||||||
|
|||||||||
Alteration of Payroll Information | Privilege Escalation | T1068: Execution with Unprivileged Software | High | ||||||
|
|||||||||
Unusual Expense Claims | Exfiltration | T1001: Data Obfuscation | Medium | ||||||
|
|||||||||
Multiple Login Attempts from Different Locations | Initial Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
Unapproved Data Exports | Command and Control | T1071: Application Layer Protocol | Medium | ||||||
|
|||||||||
Suspicious User Account Changes | Persistence | T1136: Create Account | Medium | ||||||
|
|||||||||
Malicious Software Installation | Execution | T1195: Supply Chain Compromise | High | ||||||
|
|||||||||
Increased Volume of Transactions | Execution | T1203: Exploitation for Client Execution | High | ||||||
|
|||||||||
Anomalies in Reconciliation Processes | Impact | T1481: Data Manipulation | High | ||||||
|
APIs and Their Scopes
App: Xero | API Required | Scope Required | Usage |
---|---|---|---|
Unauthorized Access Attempts | Login Activity API | com.xero.loginactivity.read | To monitor and retrieve user login attempts and status. |
Suspicious Invoice Generation | Invoice API | com.xero.invoice.read | To fetch recently created or modified invoices for review. |
Alteration of Payroll Information | Payroll API | com.xero.payroll.readwrite | To check for changes in payroll information and validate permissions. |
Unusual Expense Claims | Expense Claims API | com.xero.expenseclaims.readwrite | To retrieve and analyze expense claims for anomalies. |
Multiple Login Attempts from Different Locations | Login Activity API | com.xero.loginactivity.read | To analyze login locations and detect unusual patterns. |
Unapproved Data Exports | Data Export API | com.xero.dataexport.read | To monitor and retrieve records of data exports. |
Suspicious User Account Changes | User Management API | com.xero.usermanagement.readwrite | To track modifications to user accounts and permissions. |
Malicious Software Installation | Software Inventory API | com.xero.softwareinventory.read | To check installed applications and verify their legitimacy. |
Increased Volume of Transactions | Transaction Monitoring API | com.xero.transactionmonitoring.read | To analyze transaction volumes for unusual activity. |
Anomalies in Reconciliation Processes | Reconciliation API | com.xero.reconciliation.readwrite | To monitor and validate reconciliation processes for discrepancies. |
Reports and Widgets for CISO
Report Name | Widgets | Description |
---|---|---|
User Access and Activity Report | Total Logins | Overview of user logins, access levels, and activity patterns. |
Unique Users Failed Login Attempts Last Access Timestamp |
||
Invoice Generation and Approval Report | Total Invoices Created | Track invoice creation, modifications, and approvals. |
Invoices Pending Approval High-Value Invoices Recent Modifications |
||
Expense Claims Overview | Total Claims Submitted | Summary of all expense claims submitted and their statuses. |
Claims by Category Pending Approvals Anomalies Detected |
||
Payroll Changes Report | Total Changes | Overview of changes made to payroll information. |
Users Who Made Changes Changes by Time Period Alerts for Unusual Modifications |
||
Data Export Activity Report | Total Exports | Monitor data export activities and compliance. |
Exports by User Recent Export Actions Unapproved Exports |
||
User Account Modifications Report | Total Modifications | Details of changes made to user accounts and permissions. |
Users with Changed Permissions Recent Additions/Deletions Alerts for Unauthorized Changes |
||
Transaction Volume Report | Total Transactions | Analyze transaction volumes and identify anomalies. |
Transactions by Category Anomalies Detected Comparison with Historical Data |
||
Software Installation and Compliance Report | Total Software Installed | Overview of installed applications and compliance status. |
Recent Installations Compliance Status of Applications Alerts for Unauthorized Software |
||
Reconciliation Status Report | Total Reconciliations | Monitor the status of reconciliation processes and discrepancies. |
Reconciliations by Status Discrepancies Detected Alerts for Unusual Patterns |
||
Risk Assessment and Incident Summary Report | Total Incidents Logged | Summary of identified risks and incidents related to Xero usage. |
Risks Identified Incident Severity Levels Recent Alerts |