T1213.002 - Sharepoint
Sub-technique
Tactics:
Collection
Collection
Platforms:
Windows Office Suite
Windows Office Suite
Detection:
Not specified
Not specified
Description:
Adversaries may leverage the SharePoint repository as a source to mine valuable information. SharePoint will often contain useful information for an adversary to learn about the structure and functionality of the internal network and systems. For example, the following is a list of example information that may hold potential value to an adversary and may also be found on SharePoint:
* Policies, procedures, and standards
* Physical / logical network diagrams
* System architecture diagrams
* Technical system documentation
* Testing / development credentials (i.e., [Unsecured Credentials](https://attack.mitre.org/techniques/T1552))
* Work / project schedules
* Source code snippets
* Links to network shares and other internal resources
* Policies, procedures, and standards
* Physical / logical network diagrams
* System architecture diagrams
* Technical system documentation
* Testing / development credentials (i.e., [Unsecured Credentials](https://attack.mitre.org/techniques/T1552))
* Work / project schedules
* Source code snippets
* Links to network shares and other internal resources
Used by Actors (6)
Malware (1)
Metadata
| MITRE ID: | T1213.002 |
| STIX ID: | attack-pattern--0c4b4fda-9062-... |
| Platforms: | Windows, Office Suite |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |