
1. Initial Access
1.1. Phishing
1.1.1. AITM
1.1.1.1. Monitoring login events associated with unexpected Geo-Regions
1.1.1.1.1. FROM filebeat* | WHERE event.action == "Sign-in activity" and event.outcome == "success" | WHERE NOT CIDR_MATCH(source.ip,"<IP Subnet>/24") | WHERE NOT source.geo.country_name IN ("India", "USA", "UK") | KEEP user.name, @timestamp, event.action , source.ip, source.geo.country_name, event.outcome
1.1.1.2. Deploying an CSS Canary Token
1.1.1.3. Applying conditional access policy
1.2. Valid Account
1.2.1. Cloud Accounts
1.2.1.1. Monitoring Unusual Login Patterns
1.2.1.1.1. Password Spraying
1.2.1.2. Detecting Multi-Factor Authentication (MFA) Bypass Attempts
1.2.1.2.1. FROM filebeat-* | WHERE event.action == "ConsoleLogin" and event.outcome == "failure" | EVAL sample = ENDS_WITH(aws.cloudtrail.additional_eventdata, "MFAUsed=Yes") | KEEP user.name , @timestamp, source.ip | STATS COUNT_DISTINCT(@timestamp) BY DATE_TRUNC(30 minutes, @timestamp), user.name, source.ip
1.2.1.3. Tracking Privilege Escalation Activities
1.2.1.3.1. Assume Role
1.2.1.3.2. CreateAccessKey
1.3. Exploit Public Facing Service
1.3.1. IMDS enabled VM services
1.3.1.1. data_stream.dataset: network_traffic.http and server.ip : 169.254.169.254 and http.request.method: "GET" and url.path : /latest/meta-data/*
1.3.1.1.1. /latest/meta-data/identity-credentials/ec2/security-credentials/ec2-instance
1.3.1.1.2. /latest/meta-data/ami-id
1.3.1.1.3. /latest/meta-data/hostname
1.3.1.1.4. /latest/meta-data/public-ipv4