Visualizing Insider Threat Detection with Uncoder AI’s Decision Tree for SentinelOne Queries

[post-views]
April 24, 2025 · 4 min read
Visualizing Insider Threat Detection with Uncoder AI’s Decision Tree for SentinelOne Queries

Detecting insider access to sensitive data—like password documents—is a challenge for even mature SOC teams, especially when the activity is wrapped in benign processes like Notepad or triggered via Windows Explorer. While SentinelOne provides robust telemetry, interpreting detection rules often requires navigating multi-condition logic.

That’s where Uncoder AI’s AI-generated Decision Tree transforms the workflow. Instead of reading through a dense SentinelOne event query, security analysts now get a step-by-step logic tree, making intent and scope immediately understandable.

Explore Uncoder AI

The Detection Logic: Password File Discovery via Notepad

This rule is crafted to catch situations where a user opens password-related files (e.g., password.txt, password.xls) through Notepad, and the action is launched by explorer.exe—a telltale sign of interactive file browsing.

The detection flags potential:

  • Insider reconnaissance
  • Manual data exfiltration attempts
  • Non-compliant access to protected credentials
Input we used (click to show the text)
(SrcProcImagePath ContainsCIS “\explorer.exe” AND TgtProcImagePath ContainsCIS “notepad.exe” AND
(TgtProcCmdLine ContainsCIS “password.txt” OR TgtProcCmdLine ContainsCIS “password.csv” OR
TgtProcCmdLine ContainsCIS “password.doc” OR TgtProcCmdLine ContainsCIS “password.xls”))

How the AI-generated Decision Tree Helped

Uncoder AI’s Decision Tree broke down the query into three sequential checks:

  • Explorer.exe as the parent process
  • Notepad.exe as the executable accessing the file
  • Password-related keywords in the filename: .txt, .csv, .doc, .xls

Each condition is clearly structured as a node, visualizing the flow like a decision tree:

  • If Node 1 matches, proceed to Node 2
  • If Node 2 matches, evaluate password indicators
  • Only if all three match does the rule trigger

This approach provides unmatched clarity—especially when sharing detections across teams or building playbooks for insider threat programs.

AI Output (click to show the text)
A very specific and technical question!

The decision tree for the condition part of this s1-event is as follows:

1. Root Node: Evaluate SrcProcImagePath ContainsCIS “\explorer.exe”
• If true, proceed to next node
• If false, event does not match

2. Node 2: Evaluate TgtProcImagePath ContainsCIS “notepad.exe”
• If true, proceed to next node
• If false, event does not match

3. Node 3: Evaluate (TgtProcCmdLine ContainsCIS “password.txt” OR TgtProcCmdLine ContainsCIS “password.csv” OR
TgtProcCmdLine ContainsCIS “password.doc” OR TgtProcCmdLine ContainsCIS “password.xls”)
• This node has four child nodes, one for each OR condition:

• Node 3.1: Evaluate TgtProcCmdLine ContainsCIS “password.txt”
– If true, event matches
– If false, proceed to next child node

• Node 3.2: Evaluate TgtProcCmdLine ContainsCIS “password.csv”
– If true, event matches
– If false, proceed to next child node

• Node 3.3: Evaluate TgtProcCmdLine ContainsCIS “password.doc”
– If true, event matches
– If false, proceed to next child node

• Node 3.4: Evaluate TgtProcCmdLine ContainsCIS “password.xls”
– If true, event matches
– If false, event does not match

In summary, the decision tree evaluates three main conditions:

1. The source process image path contains \explorer.exe
2. The target process image path contains notepad.exe
3. The target process command line contains any of the specified password-related file names
(password.txt, password.csv, password.doc, or password.xls)

If all three conditions are true, the event matches; otherwise, it does not match.

Operational Benefits

  • Triage Time Reduced: Analysts no longer need to parse through nested logic manually
  • Audit-Friendly Structure: Easy to document and explain in internal reviews or compliance checks
  • Improved Accuracy: Better understanding means fewer misfires or overlooked risk signals

When dealing with sensitive data access—especially potential password exfiltration—understanding the “how” and “why” of detection logic is just as important as the alert itself.

From Rule to Readability: Uncoder AI in Action

The AI-generated Decision Tree in Uncoder AI doesn’t just translate query language. It teaches the logic, guides response prioritization, and makes complex detection rules instantly usable across SOC roles.

Explore Uncoder AI

Table of Contents

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts