EXPLORE
← Back to Explore
T1213

Data from Information Repositories

Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, such as Credential Access, Lateral Movement, or Defense Evasion, or direct access to the target information. Adversaries may also abuse external sharing features to share sensitive docu...

LinuxWindowsmacOSSaaSIaaSOffice Suite
24
Detections
2
Sources
1
Threat Actors

BY SOURCE

17elastic7sigma

PROCEDURES (17)

Service3 detections

Auto-extracted: 3 detections for service

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Service2 detections

Auto-extracted: 2 detections for service

Token2 detections

Auto-extracted: 2 detections for token

Exfiltrat2 detections

Auto-extracted: 2 detections for exfiltrat

Cloud2 detections

Auto-extracted: 2 detections for cloud

Azure1 detections

Auto-extracted: 1 detections for azure

Powershell1 detections

Auto-extracted: 1 detections for powershell

Phish1 detections

Auto-extracted: 1 detections for phish

Credential1 detections

Auto-extracted: 1 detections for credential

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Persist1 detections

Auto-extracted: 1 detections for persist

Azure1 detections

Auto-extracted: 1 detections for azure

Persist1 detections

Auto-extracted: 1 detections for persist

Unusual1 detections

Auto-extracted: 1 detections for unusual

THREAT ACTORS (1)

DETECTIONS (24)