create-attack-technique

Each attack technique is composed of two files, which should be stored in v2/internal/attacktechniques/<platform>/<mitre-attack-tactic>/<name> (e.g., v2/internal/attacktechniques/aws/defense-evasion/cloudtrail-delete/ ):

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "create-attack-technique" with this command: npx skills add datadog/stratus-red-team/datadog-stratus-red-team-create-attack-technique

Overview

Each attack technique is composed of two files, which should be stored in v2/internal/attacktechniques/<platform>/<mitre-attack-tactic>/<name> (e.g., v2/internal/attacktechniques/aws/defense-evasion/cloudtrail-delete/ ):

  • main.go , containing the imperative attack logic

  • most of the time, main.tf containing prerequisite infrastructure.

The lifecycle of an attack technique in Stratus Red Team is:

  • COLD

  • WARM: The prerequisite infrastructure is ready.

  • DETONATED: The attack technique was detonated.

Guiding principles

An attack technique should be granular, meaning that it should emulate a single step of an attack.

  • Good: Share an EBS snapshot with an external AWS account.

  • Bad: Use an IAM access key to perform privilege escalation, run discovery commands, take an EBS snapshot of an instance, share the EBS snapshot with an external AWS account.

Techniques should emulate plausible and documented attacker behavior

An attack technique should not be dependent on the state of the cloud environment it's run against.

Instructions

When creating a new technique, follow the workflow below step by step. When reviewing a PR or existing technique, use the guidelines below as a checklist to verify correctness and consistency.

Create the prerequisite infrastructure in the Terraform file

Provider versions and configurations to use

See references/provider-configs.md for the required Terraform provider blocks for each platform (AWS, Azure, Entra ID, GCP, Kubernetes).

When you're done, format your Terraform file using:

terraform fmt -write v2/internal/attacktechniques/<platform>/<tactic>/<name>/main.tf

Use of outputs

  • Any outputs you defined will be passed to the Go file, which can consume them from the detonate and revert functions, e.g. params["output_name"] .

  • The value of the display output is displayed back to the user on the CLI. Example:

output "display" { value = format("%s Secrets Manager secrets ready", local.num_secrets) }

Write the Go detonation code

Skeleton

See assets/sample-attack-technique.go

Guidelines for Go detonation code

  • As much as possible, use the official cloud providers' Go SDK.

  • For AWS, use the AWS SDK for Go v2.

  • Leverage methods from the injected 'providers' objects to instantiate cloud providers' SDK. Examples below

  • AWS CloudTrail: cloudtrail.NewFromConfig(providers.AWS().GetConnection())

  • Azure Network: client, err := armnetwork.NewClientFactory(providers.Azure().SubscriptionID, providers.Azure().GetCredentials(), providers.Azure().ClientOptions)

  • GCP IAM: service, err := iam.NewService(ctx, providers.GCP().Options())

Error handling

  • Always return errors from detonate and revert — never use log.Fatalf() .

  • Use fmt.Errorf("failed to <action>: %w", err) for error wrapping.

  • Log the operation being attempted before making the API call with log.Println .

Revert function

If the detonation is reversible, implement a revert function that undoes the changes made by detonate . This allows the technique to be cleaned up after use. The revert function has the same signature as detonate : func revert(params map[string]string, providers stratus.CloudProviders) error . See assets/sample-attack-technique.go for an example.

Guideline for documentation fields

  • ID should always be of the form platform.mitre-attack-tactic.name , e.g. aws.defense-evasion.cloudtrail-delete

  • FriendlyName should always start with a verb, and be in the infinitive form.

  • Bad: S3 ransomware , Creates S3 ransomware

  • Good: Simulate S3 ransomware

  • Description should contain at least an intro sentence and a Warm-up, Detonation, References section. "References" should ideally be examples of usage/sightings of this technique in the wild, or relevant cloud provider documentation. Example:

Establishes persistence by creating a service account key on an existing service account.

Warm-up:

  • Create a service account

Detonation:

  • Create a new key for the service account

References:

Identify when a CloudTrail trail is disabled, through CloudTrail's <code>StopLogging</code> event.

GuardDuty also provides a dedicated finding type, <a href="https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-iam.html#stealth-iam-cloudtrailloggingdisabled">Stealth:IAMUser/CloudTrailLoggingDisabled&#x3C;/a>.

  • IsIdempotent : set to true if the detonation can be called multiple times without side effects.

Add your new Go file to the imported attack techniques

Add a new import corresponding to your new Go file in v2/internal/attacktechniques/main.go .

Format your go code

Run:

cd v2 # if you're not already in there go fmt ./...

Autogenerate docs

make docs

DON'T

  • Don't persist anything in the Go detonation code. The revert and detonate methods are called in different runs, so they cannot use variables to share state.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

test-attack-technique

No summary provided by upstream source.

Repository SourceNeeds Review
General

techdebt

No summary provided by upstream source.

Repository SourceNeeds Review
General

datadog

No summary provided by upstream source.

Repository SourceNeeds Review