T1020.001

Traffic Duplication

Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised infrastructure. Traffic mirroring is a native feature for some network devices and cloud environments, often used for legitimate network analysis. Adversaries may abuse this capability to mirror or redirect network traffic through infrastructure they control, enabling passive interception of credentials, session tokens, and sensitive data. Cloud-based environments (AWS Traffic Mirroring, GCP Packet Mirroring, Azure vTAP) provide native APIs for configuring traffic duplication, which adversaries may invoke directly after gaining sufficient privileges.

Microsoft Sentinel / Defender
kusto
// AWS Traffic Mirroring — detect new mirror session creation via CloudTrail-style logs in Sentinel
let AWSTrafficMirrorEvents = AzureActivity
| where TimeGenerated > ago(24h)
| where OperationName has_any ("CreateTrafficMirrorSession", "CreateTrafficMirrorTarget", "CreateTrafficMirrorFilter", "ModifyTrafficMirrorSession", "ModifyTrafficMirrorFilterRule")
| extend EventSource = "Azure"
| project TimeGenerated, OperationName, Caller, CallerIpAddress, ResourceGroup, SubscriptionId, EventSource;
// Azure vTAP — detect virtual network TAP creation or modification
let AzurevTAPEvents = AzureActivity
| where TimeGenerated > ago(24h)
| where OperationName has_any ("Microsoft.Network/virtualNetworkTaps/write", "Microsoft.Network/virtualNetworkTaps/delete", "Microsoft.Network/networkInterfaces/tapConfigurations/write")
| extend EventSource = "AzurevTAP"
| project TimeGenerated, OperationName, Caller, CallerIpAddress, ResourceGroup, SubscriptionId, EventSource;
// Combine results
AWSTrafficMirrorEvents
| union AzurevTAPEvents
| sort by TimeGenerated desc
high severity medium confidence

Data Sources

Cloud Service: Cloud Service Modification Network Traffic: Network Traffic Flow Azure Activity Logs

Required Tables

AzureActivity

False Positives

  • Network operations teams legitimately configuring traffic mirroring for IDS/IPS or network performance monitoring purposes
  • Security teams deploying packet capture appliances or NDR sensors that require vTAP or traffic mirror configurations
  • Cloud infrastructure automation (Terraform, Ansible, Pulumi) that provisions traffic mirroring as part of baseline network security architecture
  • Managed security service providers (MSSPs) configuring traffic mirroring in customer environments for monitoring
  • Cloud migration projects that temporarily mirror traffic for validation and testing before full cutover

Unlock Pro Content

Get the full detection package for T1020.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections