AWS EC2 Full Network Packet Capture Detected
Detects successful creation of an Amazon EC2 Traffic Mirroring session. A session copies full packets from a source Elastic Network Interface (ENI) to a mirror target (e.g., an ENI or NLB) using a mirror filter (ingress/egress rules). While used for diagnostics and NDR/IDS tooling, adversaries can abuse sessions to covertly capture and exfiltrate sensitive, potentially unencrypted, traffic from instances or subnets.
Rule type: query
Rule indices:
- filebeat-*
- logs-aws.cloudtrail-*
Rule Severity: medium
Risk Score: 47
Runs every:
Searches indices from: now-6m
Maximum alerts per execution: ?
References:
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_TrafficMirrorSession.html
- https://rhinosecuritylabs.com/aws/abusing-vpc-traffic-mirroring-in-aws/
Tags:
- Domain: Cloud
- Data Source: AWS
- Data Source: Amazon Web Services
- Data Source: AWS EC2
- Use Case: Network Security Monitoring
- Tactic: Exfiltration
- Tactic: Collection
- Resources: Investigation Guide
Version: ?
Rule authors:
- Elastic
- Austin Songer
Rule license: Elastic License v2
This alert fires on a successful CreateTrafficMirrorSession, which enables full-packet Traffic Mirroring from a
source ENI to a mirror target under a given filter. Because sessions immediately begin sending packets once active,
treat unexpected creations as high priority.
Identify the actor and execution context
- Principal: Review
aws.cloudtrail.user_identity.arn,aws.cloudtrail.user_identity.type, andaws.cloudtrail.user_identity.access_key_idto determine who created the session (human IAM user vs. assumed role vs. automation). - Caller metadata: Check
user_agent.original, andsource.ipfor unusual tools, hosts, or locations. - Account/Region/Time: Validate
cloud.account.id,cloud.region, and@timestampagainst change windows or tickets.
Extract the session details from the event
- Request parameters: Parse
aws.cloudtrail.request_parametersfor:NetworkInterfaceId(mirrored source ENI) map to the EC2 instance and its business function.TrafficMirrorTargetIdidentify where packets are being sent (ENI vs. NLB).TrafficMirrorFilterIdcheck which directions and protocols are allowed (ingress/egress, ports).SessionNumber,Description,TagSpecificationslook for operator tags or suspicious notes.
- Response elements: Use
aws.cloudtrail.response_elementsto confirm the createdTrafficMirrorSessionIdand any resolved resource ARNs/IDs.
Pivot for related API calls to validate scope and intent Look before and after this event (±30–60 minutes) by the same principal / access key / source IP for:
- Target & Filter lifecycle:
CreateTrafficMirrorTarget,CreateTrafficMirrorFilter,CreateTrafficMirrorFilterRule,ModifyTrafficMirrorSession|Filter|FilterRule, andDelete*calls (rapid create-modify patterns can indicate staging). - Session management:
DeleteTrafficMirrorSessionshortly after creation (test/probe), or repeated creations to different targets. - Discovery/positioning:
DescribeNetworkInterfaces,DescribeInstances,DescribeVpcs/Subnets/RouteTablesaround the same time. - Cross-account indicators: creation of targets that forward to infrastructure not owned by your account (e.g., NLB in shared services).
- Other suspicious changes: IAM permission changes, new access keys, or S3/SNS setup that could support exfil/ops.
Validate the mirror destination and potential data exposure
- If the target is an ENI: identify the owning instance/application; confirm it is an approved NDR/packet capture host.
- If the target is an NLB target: determine where the NLB sends traffic (could be a collection point in another VPC or account).
- Assess whether mirrored flows include plaintext protocols (internal HTTP, databases, LDAP, etc.) increasing sensitivity.
- Authorized monitoring: Approved NDR/IDS tooling or troubleshooting playbooks may legitimately create sessions.
- Ops/diagnostics: Short-lived sessions during incident handling or performance analysis.
- Automation: Infrastructure pipelines that stand up temporary mirroring for validation.
Contain
- If unauthorized, terminate the session immediately (use the
TrafficMirrorSessionIdfromaws.cloudtrail.response_elements) and block creation permissions for the offending principal. - Quarantine or restrict egress from the target if you suspect it is forwarding captured traffic outside approved destinations.
Investigate
- Enumerate all active sessions in the affected account/region; verify there aren’t additional rogue sessions.
- Review related target and filter resources (and recent
Modify*calls) to understand captured scope and recipients. - Trace the source ENI back to the EC2 instance and validate whether sensitive workloads were mirrored.
Recover & harden
- Remove or lock down unapproved targets/filters; enforce least privilege on
ec2:CreateTrafficMirrorSession/Target/Filter. - Consider SCPs or IAM conditions limiting who/where sessions can be created (e.g., only into designated monitoring VPCs).
- Ensure monitoring targets are controlled, logged, and not internet-reachable.
Improve
- Add correlation logic to automatically surface CreateTrafficMirrorSession alongside Create/Modify Target/Filter calls by the same actor.
- Require tags on approved mirroring resources; alert on untagged/unticketed creations.
- Update playbooks to include a standard validation checklist (principal, source ENI, target, filter rules, destination path).
event.dataset: "aws.cloudtrail" and
event.provider: "ec2.amazonaws.com" and
event.action: "CreateTrafficMirrorSession" and
event.outcome: "success"
Framework: MITRE ATT&CK
Tactic:
- Name: Exfiltration
- Id: TA0010
- Reference URL: https://attack.mitre.org/tactics/TA0010/
Technique:
- Name: Automated Exfiltration
- Id: T1020
- Reference URL: https://attack.mitre.org/techniques/T1020/
Technique:
- Name: Transfer Data to Cloud Account
- Id: T1537
- Reference URL: https://attack.mitre.org/techniques/T1537/
Framework: MITRE ATT&CK
Tactic:
- Name: Collection
- Id: TA0009
- Reference URL: https://attack.mitre.org/tactics/TA0009/
Technique:
- Name: Data Staged
- Id: T1074
- Reference URL: https://attack.mitre.org/techniques/T1074/
Framework: MITRE ATT&CK
Tactic:
- Name: Discovery
- Id: TA0007
- Reference URL: https://attack.mitre.org/tactics/TA0007/
Technique:
- Name: Network Sniffing
- Id: T1040
- Reference URL: https://attack.mitre.org/techniques/T1040/