Data Exfiltration Investigation Runbook
SOC & DFIR Operations Guide
Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access.
Overview & Scope
This runbook provides standardised procedures for investigating data exfiltration attacks across the hybrid enterprise environment. Data exfiltration is a critical phase in the attack lifecycle where adversaries steal sensitive data from the organisation, often representing the primary objective of sophisticated attacks.
What is Data Exfiltration?
Data exfiltration (also known as data theft, data extrusion, or data leakage) is the unauthorised transfer of data from an organisation. It can be performed by external threat actors who have compromised the environment or by malicious insiders abusing their legitimate access.
Key Considerations:
Exfiltration is often the final stage before an attack is discovered
Data theft may occur over extended periods (low and slow)
Ransomware actors increasingly exfiltrate before encrypting (double extortion)
Insider threats may use legitimate tools and access
Cloud services create new exfiltration vectors
Data at Risk Categories
Personally Identifiable Information (PII)
SSN, addresses, phone numbers, DOB
High
Protected Health Information (PHI)
Medical records, insurance data
Critical
Financial Data
Credit cards, bank accounts, financial reports
Critical
Intellectual Property
Source code, patents, trade secrets, designs
Critical
Customer Data
Customer lists, contracts, communications
High
Employee Data
HR records, salaries, performance reviews
High
Authentication Data
Passwords, keys, certificates, tokens
Critical
Strategic Information
M&A plans, business strategies, pricing
High
Legal/Compliance
Legal holds, audit data, compliance reports
High
Exfiltration Methods
By Channel
Network (Unencrypted)
HTTP, FTP, SMB to external
Low
Network (Encrypted)
HTTPS, SFTP, encrypted tunnels
Medium-High
Attachments, body content
Low-Medium
Cloud Storage
OneDrive, Dropbox, Google Drive, etc.
Medium
Removable Media
USB drives, external HDD
Medium
Physical
Printed documents, photos of screens
High
Covert Channels
DNS tunneling, steganography, ICMP
High
Application-Based
Messaging apps, file sharing apps
Medium
By Technique
Exfiltration Over C2
Using existing C2 channel
T1041
Exfiltration Over Web Service
Cloud storage, paste sites
T1567
Exfiltration Over Alternative Protocol
DNS, ICMP, non-standard ports
T1048
Automated Exfiltration
Scheduled/triggered data theft
T1020
Data Transfer Size Limits
Chunking to avoid detection
T1030
Scheduled Transfer
Off-hours to avoid detection
T1029
Exfiltration Over Physical Medium
USB, external drives
T1052
Exfiltration Over Bluetooth
Wireless data transfer
T1011.001
By Actor Type
External Threat Actor
Espionage, extortion, sale
C2, cloud upload, encrypted
Ransomware Operator
Double extortion leverage
Bulk transfer, cloud upload
Nation-State
Intelligence gathering
Low and slow, covert channels
Malicious Insider
Financial gain, revenge
Email, USB, cloud sync
Negligent Insider
Convenience, lack of awareness
Email, personal cloud
Departing Employee
Taking work, competitive advantage
USB, personal email, cloud
Data Exfiltration Lifecycle
Detection Sources & Data Mapping
Log Sources Matrix
Defender for Endpoint
DeviceFileEvents
File access, copy, archive creation
Defender for Endpoint
DeviceNetworkEvents
Outbound transfers, DNS queries
Defender for Endpoint
DeviceEvents
USB activity, Bluetooth, print
Defender for Endpoint
DeviceProcessEvents
Compression tools, exfil utilities
Cloud Apps
CloudAppEvents
Cloud storage uploads, sharing
Exchange Online
EmailEvents, EmailAttachmentInfo
Email with attachments
SharePoint/OneDrive
OfficeActivity
Downloads, sharing, sync
Purview
DlpAll
DLP policy matches
Purview
InsiderRiskManagement
Insider risk alerts
Sentinel
AzureActivity
Azure resource data access
Sentinel
ThreatIntelligenceIndicator
Known exfil infrastructure
Prisma Access
PaloAltoPrismaAccess
Network transfers, URL categories
Entra ID
SigninLogs, AuditLogs
Application access patterns
Critical Event Categories
File Operations
Mass file access
Bulk file opens/reads
High volume in short time
Archive creation
ZIP, RAR, 7z creation
Large archives, sensitive paths
File copy to removable
Copy to USB/external
Any sensitive data
File rename/extension change
Disguising files
Hiding data type
Sensitive file access
Labeled/classified files
Unusual accessor or volume
File download from cloud
SharePoint/OneDrive download
Bulk downloads
Network Activity
Large outbound transfers
High upload volume
Unusual destination
Transfers to file sharing
Cloud storage uploads
Personal accounts
DNS tunneling
Data in DNS queries
High volume, long queries
Non-standard ports
Data on unusual ports
Encrypted traffic on odd ports
Known bad destinations
C2, paste sites
Threat intel matches
After-hours transfers
Off-peak large transfers
Unusual for user
Email Activity
Large attachments
Files over threshold
Unusual for sender
Sensitive attachments
Labeled files attached
External recipients
Personal email forwards
Forwarding to personal
Any corporate data
Bulk email to external
Many external recipients
Data in body/attachments
Encrypted attachments
Password-protected files
Avoiding DLP
Cloud Activity
External sharing
Sharing with outside org
Sensitive content
Anonymous links
Anyone with link access
Sensitive files
Sync to personal device
OneDrive/SharePoint sync
Unmanaged devices
Third-party app access
OAuth apps accessing data
Excessive permissions
Bulk downloads
Mass file downloads
Unusual volume
Windows Event IDs
4663
Security
Object access attempt
File access tracking
4656
Security
Handle to object requested
File access audit
4658
Security
Handle closed
File operation complete
4660
Security
Object deleted
Evidence destruction
4670
Security
Permissions changed
Access modification
5140
Security
Network share accessed
Share enumeration
5145
Security
Share object access check
File share access
6416
Security
External device recognized
USB detection
4688
Security
Process creation
Archive tools
307
PrintService
Document printed
Print exfiltration
Investigation Workflows
General Data Exfiltration Investigation
Objective: Identify, scope, and contain data exfiltration, determine what data was stolen, and assess impact.
Step 1: Initial Triage
Identify the alert source (DLP, UEBA, network, endpoint)
Determine the user/account involved
Identify the data type/sensitivity flagged
Check for related alerts or incidents
Assess initial scope and urgency
Step 2: User Context Analysis
Review user's role and normal data access
Check employment status (departing, notice period)
Review recent HR flags or performance issues
Identify if user has legitimate business need
Check for prior security incidents
Step 3: Activity Timeline Construction
Query all data access for user (7-30 days)
Identify anomalous access patterns
Document file types and sensitivity
Map access to exfiltration attempts
Correlate with authentication events
Step 4: Exfiltration Channel Identification
Review network connections and transfers
Check email for attachments/forwards
Review cloud storage activity
Check for removable media usage
Review print activity
Step 5: Data Impact Assessment
Identify all data potentially exfiltrated
Classify data by sensitivity level
Determine regulatory implications (PII, PHI, PCI)
Assess business impact
Document for legal/compliance
Step 6: Scope Expansion
Check for similar activity by other users
Search for data on known bad destinations
Review shared infrastructure/access
Check for accomplices or shared accounts
Assess if part of larger compromise
Cloud Storage Exfiltration Investigation
Objective: Investigate data theft via cloud storage services (OneDrive, SharePoint, Dropbox, Google Drive, etc.).
Detection Indicators
Large volume file downloads from SharePoint/OneDrive
Syncing to unmanaged/personal devices
External sharing of sensitive files
Anonymous link creation for sensitive content
Personal cloud storage app usage
Bulk downloads before account changes
Investigation Steps
Identify Cloud Activity
Query CloudAppEvents for upload/download activity
Check OfficeActivity for SharePoint/OneDrive operations
Review Shadow IT usage via MDCA
Identify personal vs. corporate accounts
Analyse Access Patterns
Compare to baseline access behaviour
Check for bulk operations
Identify accessed file sensitivity
Review timing (off-hours, last day)
External Sharing Review
List all external shares by user
Check for anonymous links created
Review share recipients
Identify sensitive content shared
Sync Activity Analysis
Check for OneDrive sync to personal devices
Review device registration status
Identify unmanaged device syncs
Check for selective sync of sensitive folders
Third-Party Cloud Apps
Review OAuth app authorisations
Check for data access by apps
Identify personal cloud storage apps
Review MDCA sanctioned/unsanctioned apps
Email-Based Exfiltration Investigation
Objective: Investigate data theft via email attachments or body content.
Detection Indicators
Emails with large attachments to external recipients
Sensitive files attached to personal email
Password-protected attachments (DLP bypass)
Bulk email to external addresses
Auto-forward rules to external addresses
Email to known personal accounts
Investigation Steps
Email Pattern Analysis
Query EmailEvents for external sends
Review attachment sizes and types
Check for DLP policy matches
Identify unusual recipients
Attachment Analysis
Review EmailAttachmentInfo for details
Check file types and names
Identify sensitive content indicators
Review if encrypted/password-protected
Forwarding Rules Review
Check for inbox rules forwarding externally
Review mailbox forwarding configuration
Identify delegates with forward permissions
Check mobile device forwarding
Recipient Analysis
Categorise recipients (personal, competitor, unknown)
Check for first-time recipients
Review recipient domains
Identify patterns in recipients
Endpoint-Based Exfiltration Investigation
Objective: Investigate data theft via endpoint methods (USB, Bluetooth, print, local storage).
Detection Indicators
USB device connections
Large file copies to removable media
Bluetooth file transfers
Mass printing activity
Archive creation with sensitive files
Airdrop or similar local transfers
Investigation Steps
Removable Media Analysis
Query DeviceEvents for USB connections
Identify device types and serial numbers
Review files copied to devices
Check for encrypted transfers
Archive/Compression Activity
Query for ZIP, RAR, 7z creation
Review archive contents if available
Check source directories
Identify password protection
Print Activity
Query print logs for document printing
Identify sensitive documents printed
Review print volume anomalies
Check print-to-file activity
Local Transfer Methods
Check for Bluetooth transfers
Review network sharing activity
Check for Airdrop (if applicable)
Review cloud sync client activity
Network-Based Exfiltration Investigation
Objective: Investigate data theft via network channels, including C2, web uploads, and covert channels.
Detection Indicators
Large outbound data transfers
Transfers to unknown or suspicious IPs
Non-standard port usage
DNS tunnelling patterns
ICMP data transfer
Encrypted traffic to unusual destinations
Investigation Steps
Traffic Volume Analysis
Query DeviceNetworkEvents for large transfers
Identify top talkers (bytes out)
Compare to baseline network usage
Check for sustained vs. burst transfers
Destination Analysis
Review destination IPs and domains
Check threat intelligence for IOCs
Identify known file sharing sites
Review geographic anomalies
Protocol Analysis
Check for non-standard ports
Review encrypted traffic destinations
Identify potential tunnelling (DNS, ICMP)
Check for C2 pattern indicators
Prisma Access Analysis
Review URL filtering logs
Check for file sharing categories
Identify blocked upload attempts
Review data transfer by application
Insider Threat Investigation
Objective: Investigate potential malicious insider data theft with sensitivity to HR and legal requirements.
Pre-Investigation Considerations
⚠️ Important: Insider threat investigations are sensitive. Before proceeding:
Coordinate with HR and Legal
Follow established insider threat procedures
Maintain confidentiality
Document chain of custody
Consider union/works council requirements
Risk Indicators
Resignation submitted
Employment
High
Performance issues
HR
Medium
Passed over for promotion
HR
Medium
Working unusual hours
Behavioral
Low-Medium
Excessive data access
Technical
High
USB usage increase
Technical
Medium
Email to personal accounts
Technical
High
Accessing unrelated data
Technical
High
Investigation Steps
Context Gathering
Coordinate with HR on employment status
Review role and normal data access needs
Check for known grievances or issues
Identify access to sensitive data
Behavioral Analysis
Compare recent activity to baseline
Identify access pattern changes
Review login times and locations
Check for policy violations
Data Access Review
Query all file access (extended timeline)
Identify access outside normal scope
Review search queries if available
Check for bulk download patterns
Exfiltration Channel Review
Check all potential exfil channels
Review email to personal addresses
Check USB and removable media
Review cloud storage activity
Check print logs
Evidence Preservation
Preserve logs with timestamps
Document findings thoroughly
Maintain chain of custody
Prepare for potential legal action
KQL Query Cheat Sheet
File Access Analysis
Mass File Access Detection
Sensitive File Access by Unusual Users
Archive Creation with Sensitive Files
File Copy to External Paths
USB/Removable Media Detection
USB Device Connections
Files Written to Removable Media
Cloud Storage Exfiltration
SharePoint/OneDrive Download Activity
External Sharing Detection
Anonymous Link Creation
Third-Party Cloud Storage Usage
Email Exfiltration Detection
Large Attachments to External Recipients
Emails to Personal Domains
Password-Protected Attachments (DLP Bypass)
Network Exfiltration Detection
Large Outbound Transfers
Transfers to File Sharing Sites
DNS Tunnelling Detection
After-Hours Large Transfers
Staging & Preparation Detection
Data Staging Directory Detection
Compression Tool Usage
Database Export Tools
DLP & Purview Alerts
DLP Policy Matches
Insider Risk Alerts
User Behaviour Analysis
User Data Access Baseline Comparison
Departing Employee Monitoring
Print Activity Detection
Mass Printing Detection
Sensitive Document Printing
Response Actions & Remediation
Immediate Containment Actions
Active Exfiltration Detected
Block network access
Prisma Access / Firewall
Insider Threat Confirmed
Disable account
Entra ID + AD
USB Exfiltration
Block USB ports
MDE device policy
Cloud Sharing Active
Revoke sharing permissions
SharePoint Admin
Email Exfiltration
Block outbound email
Exchange transport rule
Compromised Account
Reset credentials, revoke sessions
Entra ID
Malware-Based Exfil
Isolate endpoint
MDE device isolation
Account Containment
Data Access Revocation
Email Containment
Endpoint Containment
Evidence Preservation
Critical Evidence to Preserve
File access logs
MDE, SharePoint, OneDrive
Export immediately
Network logs
Prisma Access, MDE
Export immediately
Email logs
Exchange, MDO
Export/hold
Sign-in logs
Entra ID
Export immediately
Audit logs
Unified Audit Log
Export immediately
Endpoint forensics
MDE Live Response
Collect if needed
DLP alerts
Purview
Document
Evidence Collection Script
Quick Reference Cards
Exfiltration Indicator Checklist
File Activity Red Flags
[ ] Mass file access (>100 files/hour)
[ ] Access to files outside normal scope
[ ] Archive creation (ZIP, RAR, 7z)
[ ] Large archives (>100MB)
[ ] File access during off-hours
[ ] Access spike before leaving
[ ] Renamed file extensions
[ ] Access to backup/export folders
Network Red Flags
[ ] Large outbound transfers (>100MB)
[ ] Transfers to file sharing sites
[ ] Non-standard port usage
[ ] DNS query anomalies (length, volume)
[ ] Encrypted traffic to unknown IPs
[ ] After-hours data transfers
[ ] Traffic to paste sites
[ ] C2-like beaconing patterns
Email Red Flags
[ ] Large attachments to external
[ ] Emails to personal accounts
[ ] Password-protected attachments
[ ] Bulk external emails
[ ] Forwarding rules to external
[ ] Unusual attachment types
[ ] Emails to competitors
Cloud Storage Red Flags
[ ] Bulk downloads from SharePoint
[ ] External sharing of sensitive files
[ ] Anonymous link creation
[ ] Sync to unmanaged devices
[ ] Personal cloud app usage
[ ] Third-party OAuth access
[ ] Sharing with personal accounts
Endpoint Red Flags
[ ] USB device connections
[ ] Files copied to removable media
[ ] Mass printing
[ ] Bluetooth transfers
[ ] Screen capture tools
[ ] Clipboard history abuse
[ ] Screenshot of sensitive data
Data Classification Quick Reference
Public
Marketing materials, press releases
No restrictions
Internal
General business docs, policies
Internal only
Confidential
Financial reports, contracts
Need-to-know
Restricted
PII, PHI, trade secrets
Strict controls
Top Secret
M&A, strategic plans
Executive only
Common Exfiltration Tools
rclone
Cloud sync
rclone.exe, config files
WinSCP
SFTP/SCP
winscp.exe, .ini files
FileZilla
FTP
filezilla.exe, sitemanager.xml
MegaSync
Cloud
megasync.exe
Dropbox
Cloud sync
Dropbox.exe
Google Drive
Cloud sync
googledrivesync.exe
curl/wget
HTTP transfer
curl.exe, wget.exe
PowerShell
Various
Invoke-WebRequest, Upload
certutil
Encode/Decode
-encode, -decode flags
bitsadmin
Download
/transfer command
Regulatory Considerations
PII (US)
State breach laws
Varies by state (typically 30-60 days)
PII (EU)
GDPR
72 hours to authority
PHI
HIPAA
60 days
Financial
GLBA, SOX
Varies
PCI
PCI-DSS
Varies by contract
Government
FISMA, FedRAMP
Immediate to 24 hours
Escalation Matrix
Severity Classification
🔴 Critical
Active exfiltration of critical data, confirmed insider threat, ransomware exfil before encryption
Immediate - 15 min
🟠 High
Large data transfer detected, sensitive data exposed externally, departing employee with data
30 min - 1 hour
🟡 Medium
DLP policy violations, unusual access patterns, potential data staging
4 hours
🟢 Low
Minor policy violations, blocked exfil attempts, awareness issues
Next business day
Escalation Triggers
Confirmed exfil of restricted data
DFIR + Legal + CISO
PII/PHI data exposed
DFIR + Legal + Privacy Officer
Intellectual property theft
DFIR + Legal + Business Owner
Active insider threat
DFIR + HR + Legal
Ransomware exfiltration
DFIR + CISO + Leadership
Customer data exposed
DFIR + Legal + Customer Success
>1GB confirmed exfiltrated
Tier 2 SOC + DFIR
Regulatory data involved
Legal + Compliance + Privacy
External Notifications
PII breach (US)
State AG offices
Per state law (30-60 days typical)
PII breach (EU)
Data Protection Authority
72 hours
PHI breach
HHS OCR
60 days (or 60 days for <500 individuals)
PCI breach
Card brands, acquirer
Immediately
Government data
Relevant agency
Per contract/regulation
Cyber insurance
Carrier
Per policy (usually 24-72 hours)
MITRE ATT&CK Mapping
Exfiltration (TA0010)
Exfiltration Over C2 Channel
T1041
Using existing C2
DeviceNetworkEvents, C2 patterns
Exfiltration Over Alternative Protocol
T1048
DNS, ICMP tunneling
DeviceNetworkEvents, DNS logs
Exfiltration Over Web Service
T1567
Cloud storage upload
CloudAppEvents
Exfiltration Over Web Service: Cloud Storage
T1567.002
Dropbox, Google Drive, etc.
CloudAppEvents, DeviceNetworkEvents
Exfiltration Over Physical Medium
T1052
USB, external drives
DeviceEvents (PnP)
Automated Exfiltration
T1020
Scripted data theft
DeviceProcessEvents
Scheduled Transfer
T1029
Timed exfiltration
DeviceNetworkEvents (time analysis)
Data Transfer Size Limits
T1030
Chunking data
DeviceNetworkEvents (patterns)
Transfer Data to Cloud Account
T1537
To attacker cloud
CloudAppEvents
Collection (TA0009) - Pre-Exfiltration
Archive Collected Data
T1560
ZIP, RAR creation
DeviceFileEvents, DeviceProcessEvents
Archive via Utility
T1560.001
Using compression tools
DeviceProcessEvents
Archive via Library
T1560.002
Programmatic compression
DeviceProcessEvents
Data from Local System
T1005
Local file collection
DeviceFileEvents
Data from Network Shared Drive
T1039
Shared drive access
DeviceFileEvents, Event 5140
Data from Cloud Storage
T1530
Cloud data collection
CloudAppEvents
Data Staged: Local Staging
T1074.001
Staging before exfil
DeviceFileEvents
Data Staged: Remote Staging
T1074.002
Remote staging
DeviceFileEvents
Email Collection
T1114
Collecting email data
OfficeActivity
Screen Capture
T1113
Screenshots
DeviceProcessEvents
Clipboard Data
T1115
Clipboard content
DeviceEvents
Related Techniques
Defense Evasion
Obfuscated Files
T1027
Encrypting before exfil
Defense Evasion
Indicator Removal
T1070
Deleting evidence
Impact
Data Encrypted for Impact
T1486
Ransomware with exfil
Appendix: Investigation Commands
File Access Analysis
Network Transfer Analysis
Cloud Activity Analysis
Email Analysis
USB/Removable Media Analysis
Comprehensive User Activity Export
Prevention & Hardening
DLP Policy Recommendations
Credit Card Numbers
Email, SharePoint, Endpoints
Block external sharing, notify
SSN/National ID
All locations
Block external, alert SOC
Health Records (PHI)
All locations
Block external, encrypt
Source Code
Endpoints, Cloud
Block USB, alert on cloud upload
Financial Reports
SharePoint, Email
Block external sharing
Customer PII
All locations
Block external, log all access
Endpoint Controls
USB Blocking
Prevent removable media exfil
MDE Device Control
Cloud App Control
Block unsanctioned apps
MDCA + Prisma Access
Print Restrictions
Prevent print exfil
GPO / Intune
Clipboard Control
Prevent copy/paste
Application Guard
Screen Capture Block
Prevent screenshots
Information Protection
Network Controls
Egress Filtering
Block unauthorized transfers
Prisma Access
Category Blocking
Block file sharing sites
URL Filtering
Data Transfer Limits
Alert on large uploads
Network monitoring
DNS Monitoring
Detect tunneling
DNS security
SSL Inspection
Visibility into encrypted traffic
Prisma Access
🔒 Critical Reminder: Data exfiltration investigations often have legal, HR, and regulatory implications. Always coordinate with Legal and HR before taking action on insider threat cases. Preserve evidence meticulously with documented chain of custody. Be aware of privacy regulations that may affect investigation methods in different jurisdictions. Time is critical—once data leaves the organization, recovery may be impossible.
Last updated