Data Exfiltration Investigation Runbook

SOC & DFIR Operations Guide

Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access.


Overview & Scope

This runbook provides standardised procedures for investigating data exfiltration attacks across the hybrid enterprise environment. Data exfiltration is a critical phase in the attack lifecycle where adversaries steal sensitive data from the organisation, often representing the primary objective of sophisticated attacks.

What is Data Exfiltration?

Data exfiltration (also known as data theft, data extrusion, or data leakage) is the unauthorised transfer of data from an organisation. It can be performed by external threat actors who have compromised the environment or by malicious insiders abusing their legitimate access.

Key Considerations:

  • Exfiltration is often the final stage before an attack is discovered

  • Data theft may occur over extended periods (low and slow)

  • Ransomware actors increasingly exfiltrate before encrypting (double extortion)

  • Insider threats may use legitimate tools and access

  • Cloud services create new exfiltration vectors

Data at Risk Categories

Category
Examples
Sensitivity

Personally Identifiable Information (PII)

SSN, addresses, phone numbers, DOB

High

Protected Health Information (PHI)

Medical records, insurance data

Critical

Financial Data

Credit cards, bank accounts, financial reports

Critical

Intellectual Property

Source code, patents, trade secrets, designs

Critical

Customer Data

Customer lists, contracts, communications

High

Employee Data

HR records, salaries, performance reviews

High

Authentication Data

Passwords, keys, certificates, tokens

Critical

Strategic Information

M&A plans, business strategies, pricing

High

Legal/Compliance

Legal holds, audit data, compliance reports

High

Exfiltration Methods

By Channel

Channel
Description
Detection Difficulty

Network (Unencrypted)

HTTP, FTP, SMB to external

Low

Network (Encrypted)

HTTPS, SFTP, encrypted tunnels

Medium-High

Email

Attachments, body content

Low-Medium

Cloud Storage

OneDrive, Dropbox, Google Drive, etc.

Medium

Removable Media

USB drives, external HDD

Medium

Physical

Printed documents, photos of screens

High

Covert Channels

DNS tunneling, steganography, ICMP

High

Application-Based

Messaging apps, file sharing apps

Medium

By Technique

Technique
Description
MITRE ID

Exfiltration Over C2

Using existing C2 channel

T1041

Exfiltration Over Web Service

Cloud storage, paste sites

T1567

Exfiltration Over Alternative Protocol

DNS, ICMP, non-standard ports

T1048

Automated Exfiltration

Scheduled/triggered data theft

T1020

Data Transfer Size Limits

Chunking to avoid detection

T1030

Scheduled Transfer

Off-hours to avoid detection

T1029

Exfiltration Over Physical Medium

USB, external drives

T1052

Exfiltration Over Bluetooth

Wireless data transfer

T1011.001

By Actor Type

Actor
Motivation
Typical Methods

External Threat Actor

Espionage, extortion, sale

C2, cloud upload, encrypted

Ransomware Operator

Double extortion leverage

Bulk transfer, cloud upload

Nation-State

Intelligence gathering

Low and slow, covert channels

Malicious Insider

Financial gain, revenge

Email, USB, cloud sync

Negligent Insider

Convenience, lack of awareness

Email, personal cloud

Departing Employee

Taking work, competitive advantage

USB, personal email, cloud

Data Exfiltration Lifecycle


Detection Sources & Data Mapping

Log Sources Matrix

Platform
Log Table
Exfiltration-Relevant Data

Defender for Endpoint

DeviceFileEvents

File access, copy, archive creation

Defender for Endpoint

DeviceNetworkEvents

Outbound transfers, DNS queries

Defender for Endpoint

DeviceEvents

USB activity, Bluetooth, print

Defender for Endpoint

DeviceProcessEvents

Compression tools, exfil utilities

Cloud Apps

CloudAppEvents

Cloud storage uploads, sharing

Exchange Online

EmailEvents, EmailAttachmentInfo

Email with attachments

SharePoint/OneDrive

OfficeActivity

Downloads, sharing, sync

Purview

DlpAll

DLP policy matches

Purview

InsiderRiskManagement

Insider risk alerts

Sentinel

AzureActivity

Azure resource data access

Sentinel

ThreatIntelligenceIndicator

Known exfil infrastructure

Prisma Access

PaloAltoPrismaAccess

Network transfers, URL categories

Entra ID

SigninLogs, AuditLogs

Application access patterns

Critical Event Categories

File Operations

Event Type
Description
Risk Indicator

Mass file access

Bulk file opens/reads

High volume in short time

Archive creation

ZIP, RAR, 7z creation

Large archives, sensitive paths

File copy to removable

Copy to USB/external

Any sensitive data

File rename/extension change

Disguising files

Hiding data type

Sensitive file access

Labeled/classified files

Unusual accessor or volume

File download from cloud

SharePoint/OneDrive download

Bulk downloads

Network Activity

Event Type
Description
Risk Indicator

Large outbound transfers

High upload volume

Unusual destination

Transfers to file sharing

Cloud storage uploads

Personal accounts

DNS tunneling

Data in DNS queries

High volume, long queries

Non-standard ports

Data on unusual ports

Encrypted traffic on odd ports

Known bad destinations

C2, paste sites

Threat intel matches

After-hours transfers

Off-peak large transfers

Unusual for user

Email Activity

Event Type
Description
Risk Indicator

Large attachments

Files over threshold

Unusual for sender

Sensitive attachments

Labeled files attached

External recipients

Personal email forwards

Forwarding to personal

Any corporate data

Bulk email to external

Many external recipients

Data in body/attachments

Encrypted attachments

Password-protected files

Avoiding DLP

Cloud Activity

Event Type
Description
Risk Indicator

External sharing

Sharing with outside org

Sensitive content

Anonymous links

Anyone with link access

Sensitive files

Sync to personal device

OneDrive/SharePoint sync

Unmanaged devices

Third-party app access

OAuth apps accessing data

Excessive permissions

Bulk downloads

Mass file downloads

Unusual volume

Windows Event IDs

Event ID
Log
Description
Relevance

4663

Security

Object access attempt

File access tracking

4656

Security

Handle to object requested

File access audit

4658

Security

Handle closed

File operation complete

4660

Security

Object deleted

Evidence destruction

4670

Security

Permissions changed

Access modification

5140

Security

Network share accessed

Share enumeration

5145

Security

Share object access check

File share access

6416

Security

External device recognized

USB detection

4688

Security

Process creation

Archive tools

307

PrintService

Document printed

Print exfiltration


Investigation Workflows

General Data Exfiltration Investigation

Objective: Identify, scope, and contain data exfiltration, determine what data was stolen, and assess impact.

Step 1: Initial Triage

  1. Identify the alert source (DLP, UEBA, network, endpoint)

  2. Determine the user/account involved

  3. Identify the data type/sensitivity flagged

  4. Check for related alerts or incidents

  5. Assess initial scope and urgency

Step 2: User Context Analysis

  1. Review user's role and normal data access

  2. Check employment status (departing, notice period)

  3. Review recent HR flags or performance issues

  4. Identify if user has legitimate business need

  5. Check for prior security incidents

Step 3: Activity Timeline Construction

  1. Query all data access for user (7-30 days)

  2. Identify anomalous access patterns

  3. Document file types and sensitivity

  4. Map access to exfiltration attempts

  5. Correlate with authentication events

Step 4: Exfiltration Channel Identification

  1. Review network connections and transfers

  2. Check email for attachments/forwards

  3. Review cloud storage activity

  4. Check for removable media usage

  5. Review print activity

Step 5: Data Impact Assessment

  1. Identify all data potentially exfiltrated

  2. Classify data by sensitivity level

  3. Determine regulatory implications (PII, PHI, PCI)

  4. Assess business impact

  5. Document for legal/compliance

Step 6: Scope Expansion

  1. Check for similar activity by other users

  2. Search for data on known bad destinations

  3. Review shared infrastructure/access

  4. Check for accomplices or shared accounts

  5. Assess if part of larger compromise


Cloud Storage Exfiltration Investigation

Objective: Investigate data theft via cloud storage services (OneDrive, SharePoint, Dropbox, Google Drive, etc.).

Detection Indicators

  • Large volume file downloads from SharePoint/OneDrive

  • Syncing to unmanaged/personal devices

  • External sharing of sensitive files

  • Anonymous link creation for sensitive content

  • Personal cloud storage app usage

  • Bulk downloads before account changes

Investigation Steps

  1. Identify Cloud Activity

    • Query CloudAppEvents for upload/download activity

    • Check OfficeActivity for SharePoint/OneDrive operations

    • Review Shadow IT usage via MDCA

    • Identify personal vs. corporate accounts

  2. Analyse Access Patterns

    • Compare to baseline access behaviour

    • Check for bulk operations

    • Identify accessed file sensitivity

    • Review timing (off-hours, last day)

  3. External Sharing Review

    • List all external shares by user

    • Check for anonymous links created

    • Review share recipients

    • Identify sensitive content shared

  4. Sync Activity Analysis

    • Check for OneDrive sync to personal devices

    • Review device registration status

    • Identify unmanaged device syncs

    • Check for selective sync of sensitive folders

  5. Third-Party Cloud Apps

    • Review OAuth app authorisations

    • Check for data access by apps

    • Identify personal cloud storage apps

    • Review MDCA sanctioned/unsanctioned apps


Email-Based Exfiltration Investigation

Objective: Investigate data theft via email attachments or body content.

Detection Indicators

  • Emails with large attachments to external recipients

  • Sensitive files attached to personal email

  • Password-protected attachments (DLP bypass)

  • Bulk email to external addresses

  • Auto-forward rules to external addresses

  • Email to known personal accounts

Investigation Steps

  1. Email Pattern Analysis

    • Query EmailEvents for external sends

    • Review attachment sizes and types

    • Check for DLP policy matches

    • Identify unusual recipients

  2. Attachment Analysis

    • Review EmailAttachmentInfo for details

    • Check file types and names

    • Identify sensitive content indicators

    • Review if encrypted/password-protected

  3. Forwarding Rules Review

    • Check for inbox rules forwarding externally

    • Review mailbox forwarding configuration

    • Identify delegates with forward permissions

    • Check mobile device forwarding

  4. Recipient Analysis

    • Categorise recipients (personal, competitor, unknown)

    • Check for first-time recipients

    • Review recipient domains

    • Identify patterns in recipients


Endpoint-Based Exfiltration Investigation

Objective: Investigate data theft via endpoint methods (USB, Bluetooth, print, local storage).

Detection Indicators

  • USB device connections

  • Large file copies to removable media

  • Bluetooth file transfers

  • Mass printing activity

  • Archive creation with sensitive files

  • Airdrop or similar local transfers

Investigation Steps

  1. Removable Media Analysis

    • Query DeviceEvents for USB connections

    • Identify device types and serial numbers

    • Review files copied to devices

    • Check for encrypted transfers

  2. Archive/Compression Activity

    • Query for ZIP, RAR, 7z creation

    • Review archive contents if available

    • Check source directories

    • Identify password protection

  3. Print Activity

    • Query print logs for document printing

    • Identify sensitive documents printed

    • Review print volume anomalies

    • Check print-to-file activity

  4. Local Transfer Methods

    • Check for Bluetooth transfers

    • Review network sharing activity

    • Check for Airdrop (if applicable)

    • Review cloud sync client activity


Network-Based Exfiltration Investigation

Objective: Investigate data theft via network channels, including C2, web uploads, and covert channels.

Detection Indicators

  • Large outbound data transfers

  • Transfers to unknown or suspicious IPs

  • Non-standard port usage

  • DNS tunnelling patterns

  • ICMP data transfer

  • Encrypted traffic to unusual destinations

Investigation Steps

  1. Traffic Volume Analysis

    • Query DeviceNetworkEvents for large transfers

    • Identify top talkers (bytes out)

    • Compare to baseline network usage

    • Check for sustained vs. burst transfers

  2. Destination Analysis

    • Review destination IPs and domains

    • Check threat intelligence for IOCs

    • Identify known file sharing sites

    • Review geographic anomalies

  3. Protocol Analysis

    • Check for non-standard ports

    • Review encrypted traffic destinations

    • Identify potential tunnelling (DNS, ICMP)

    • Check for C2 pattern indicators

  4. Prisma Access Analysis

    • Review URL filtering logs

    • Check for file sharing categories

    • Identify blocked upload attempts

    • Review data transfer by application


Insider Threat Investigation

Objective: Investigate potential malicious insider data theft with sensitivity to HR and legal requirements.

Pre-Investigation Considerations

⚠️ Important: Insider threat investigations are sensitive. Before proceeding:

  • Coordinate with HR and Legal

  • Follow established insider threat procedures

  • Maintain confidentiality

  • Document chain of custody

  • Consider union/works council requirements

Risk Indicators

Indicator
Category
Weight

Resignation submitted

Employment

High

Performance issues

HR

Medium

Passed over for promotion

HR

Medium

Working unusual hours

Behavioral

Low-Medium

Excessive data access

Technical

High

USB usage increase

Technical

Medium

Email to personal accounts

Technical

High

Accessing unrelated data

Technical

High

Investigation Steps

  1. Context Gathering

    • Coordinate with HR on employment status

    • Review role and normal data access needs

    • Check for known grievances or issues

    • Identify access to sensitive data

  2. Behavioral Analysis

    • Compare recent activity to baseline

    • Identify access pattern changes

    • Review login times and locations

    • Check for policy violations

  3. Data Access Review

    • Query all file access (extended timeline)

    • Identify access outside normal scope

    • Review search queries if available

    • Check for bulk download patterns

  4. Exfiltration Channel Review

    • Check all potential exfil channels

    • Review email to personal addresses

    • Check USB and removable media

    • Review cloud storage activity

    • Check print logs

  5. Evidence Preservation

    • Preserve logs with timestamps

    • Document findings thoroughly

    • Maintain chain of custody

    • Prepare for potential legal action


KQL Query Cheat Sheet

File Access Analysis

Mass File Access Detection

Sensitive File Access by Unusual Users

Archive Creation with Sensitive Files

File Copy to External Paths


USB/Removable Media Detection

USB Device Connections

Files Written to Removable Media


Cloud Storage Exfiltration

SharePoint/OneDrive Download Activity

External Sharing Detection

Third-Party Cloud Storage Usage


Email Exfiltration Detection

Large Attachments to External Recipients

Emails to Personal Domains

Password-Protected Attachments (DLP Bypass)


Network Exfiltration Detection

Large Outbound Transfers

Transfers to File Sharing Sites

DNS Tunnelling Detection

After-Hours Large Transfers


Staging & Preparation Detection

Data Staging Directory Detection

Compression Tool Usage

Database Export Tools


DLP & Purview Alerts

DLP Policy Matches

Insider Risk Alerts


User Behaviour Analysis

User Data Access Baseline Comparison

Departing Employee Monitoring


Mass Printing Detection

Sensitive Document Printing


Response Actions & Remediation

Immediate Containment Actions

Scenario
Action
Method

Active Exfiltration Detected

Block network access

Prisma Access / Firewall

Insider Threat Confirmed

Disable account

Entra ID + AD

USB Exfiltration

Block USB ports

MDE device policy

Cloud Sharing Active

Revoke sharing permissions

SharePoint Admin

Email Exfiltration

Block outbound email

Exchange transport rule

Compromised Account

Reset credentials, revoke sessions

Entra ID

Malware-Based Exfil

Isolate endpoint

MDE device isolation

Account Containment

Data Access Revocation

Email Containment

Endpoint Containment

Evidence Preservation

Critical Evidence to Preserve

Evidence Type
Source
Retention

File access logs

MDE, SharePoint, OneDrive

Export immediately

Network logs

Prisma Access, MDE

Export immediately

Email logs

Exchange, MDO

Export/hold

Sign-in logs

Entra ID

Export immediately

Audit logs

Unified Audit Log

Export immediately

Endpoint forensics

MDE Live Response

Collect if needed

DLP alerts

Purview

Document

Evidence Collection Script


Quick Reference Cards

Exfiltration Indicator Checklist

File Activity Red Flags

  • [ ] Mass file access (>100 files/hour)

  • [ ] Access to files outside normal scope

  • [ ] Archive creation (ZIP, RAR, 7z)

  • [ ] Large archives (>100MB)

  • [ ] File access during off-hours

  • [ ] Access spike before leaving

  • [ ] Renamed file extensions

  • [ ] Access to backup/export folders

Network Red Flags

  • [ ] Large outbound transfers (>100MB)

  • [ ] Transfers to file sharing sites

  • [ ] Non-standard port usage

  • [ ] DNS query anomalies (length, volume)

  • [ ] Encrypted traffic to unknown IPs

  • [ ] After-hours data transfers

  • [ ] Traffic to paste sites

  • [ ] C2-like beaconing patterns

Email Red Flags

  • [ ] Large attachments to external

  • [ ] Emails to personal accounts

  • [ ] Password-protected attachments

  • [ ] Bulk external emails

  • [ ] Forwarding rules to external

  • [ ] Unusual attachment types

  • [ ] Emails to competitors

Cloud Storage Red Flags

  • [ ] Bulk downloads from SharePoint

  • [ ] External sharing of sensitive files

  • [ ] Anonymous link creation

  • [ ] Sync to unmanaged devices

  • [ ] Personal cloud app usage

  • [ ] Third-party OAuth access

  • [ ] Sharing with personal accounts

Endpoint Red Flags

  • [ ] USB device connections

  • [ ] Files copied to removable media

  • [ ] Mass printing

  • [ ] Bluetooth transfers

  • [ ] Screen capture tools

  • [ ] Clipboard history abuse

  • [ ] Screenshot of sensitive data

Data Classification Quick Reference

Classification
Examples
Handling

Public

Marketing materials, press releases

No restrictions

Internal

General business docs, policies

Internal only

Confidential

Financial reports, contracts

Need-to-know

Restricted

PII, PHI, trade secrets

Strict controls

Top Secret

M&A, strategic plans

Executive only

Common Exfiltration Tools

Tool
Type
Indicators

rclone

Cloud sync

rclone.exe, config files

WinSCP

SFTP/SCP

winscp.exe, .ini files

FileZilla

FTP

filezilla.exe, sitemanager.xml

MegaSync

Cloud

megasync.exe

Dropbox

Cloud sync

Dropbox.exe

Google Drive

Cloud sync

googledrivesync.exe

curl/wget

HTTP transfer

curl.exe, wget.exe

PowerShell

Various

Invoke-WebRequest, Upload

certutil

Encode/Decode

-encode, -decode flags

bitsadmin

Download

/transfer command

Regulatory Considerations

Data Type
Regulations
Notification Requirements

PII (US)

State breach laws

Varies by state (typically 30-60 days)

PII (EU)

GDPR

72 hours to authority

PHI

HIPAA

60 days

Financial

GLBA, SOX

Varies

PCI

PCI-DSS

Varies by contract

Government

FISMA, FedRAMP

Immediate to 24 hours


Escalation Matrix

Severity Classification

Severity
Criteria
Response Time

🔴 Critical

Active exfiltration of critical data, confirmed insider threat, ransomware exfil before encryption

Immediate - 15 min

🟠 High

Large data transfer detected, sensitive data exposed externally, departing employee with data

30 min - 1 hour

🟡 Medium

DLP policy violations, unusual access patterns, potential data staging

4 hours

🟢 Low

Minor policy violations, blocked exfil attempts, awareness issues

Next business day

Escalation Triggers

Condition
Escalation Level

Confirmed exfil of restricted data

DFIR + Legal + CISO

PII/PHI data exposed

DFIR + Legal + Privacy Officer

Intellectual property theft

DFIR + Legal + Business Owner

Active insider threat

DFIR + HR + Legal

Ransomware exfiltration

DFIR + CISO + Leadership

Customer data exposed

DFIR + Legal + Customer Success

>1GB confirmed exfiltrated

Tier 2 SOC + DFIR

Regulatory data involved

Legal + Compliance + Privacy

External Notifications

Scenario
Notify
Timeline

PII breach (US)

State AG offices

Per state law (30-60 days typical)

PII breach (EU)

Data Protection Authority

72 hours

PHI breach

HHS OCR

60 days (or 60 days for <500 individuals)

PCI breach

Card brands, acquirer

Immediately

Government data

Relevant agency

Per contract/regulation

Cyber insurance

Carrier

Per policy (usually 24-72 hours)


MITRE ATT&CK Mapping

Exfiltration (TA0010)

Technique
ID
Description
Detection

Exfiltration Over C2 Channel

T1041

Using existing C2

DeviceNetworkEvents, C2 patterns

Exfiltration Over Alternative Protocol

T1048

DNS, ICMP tunneling

DeviceNetworkEvents, DNS logs

Exfiltration Over Web Service

T1567

Cloud storage upload

CloudAppEvents

Exfiltration Over Web Service: Cloud Storage

T1567.002

Dropbox, Google Drive, etc.

CloudAppEvents, DeviceNetworkEvents

Exfiltration Over Physical Medium

T1052

USB, external drives

DeviceEvents (PnP)

Automated Exfiltration

T1020

Scripted data theft

DeviceProcessEvents

Scheduled Transfer

T1029

Timed exfiltration

DeviceNetworkEvents (time analysis)

Data Transfer Size Limits

T1030

Chunking data

DeviceNetworkEvents (patterns)

Transfer Data to Cloud Account

T1537

To attacker cloud

CloudAppEvents

Collection (TA0009) - Pre-Exfiltration

Technique
ID
Description
Detection

Archive Collected Data

T1560

ZIP, RAR creation

DeviceFileEvents, DeviceProcessEvents

Archive via Utility

T1560.001

Using compression tools

DeviceProcessEvents

Archive via Library

T1560.002

Programmatic compression

DeviceProcessEvents

Data from Local System

T1005

Local file collection

DeviceFileEvents

Data from Network Shared Drive

T1039

Shared drive access

DeviceFileEvents, Event 5140

Data from Cloud Storage

T1530

Cloud data collection

CloudAppEvents

Data Staged: Local Staging

T1074.001

Staging before exfil

DeviceFileEvents

Data Staged: Remote Staging

T1074.002

Remote staging

DeviceFileEvents

Email Collection

T1114

Collecting email data

OfficeActivity

Screen Capture

T1113

Screenshots

DeviceProcessEvents

Clipboard Data

T1115

Clipboard content

DeviceEvents

Tactic
Technique
ID
Relevance

Defense Evasion

Obfuscated Files

T1027

Encrypting before exfil

Defense Evasion

Indicator Removal

T1070

Deleting evidence

Impact

Data Encrypted for Impact

T1486

Ransomware with exfil


Appendix: Investigation Commands

File Access Analysis

Network Transfer Analysis

Cloud Activity Analysis

Email Analysis

USB/Removable Media Analysis

Comprehensive User Activity Export


Prevention & Hardening

DLP Policy Recommendations

Policy
Scope
Action

Credit Card Numbers

Email, SharePoint, Endpoints

Block external sharing, notify

SSN/National ID

All locations

Block external, alert SOC

Health Records (PHI)

All locations

Block external, encrypt

Source Code

Endpoints, Cloud

Block USB, alert on cloud upload

Financial Reports

SharePoint, Email

Block external sharing

Customer PII

All locations

Block external, log all access

Endpoint Controls

Control
Purpose
Implementation

USB Blocking

Prevent removable media exfil

MDE Device Control

Cloud App Control

Block unsanctioned apps

MDCA + Prisma Access

Print Restrictions

Prevent print exfil

GPO / Intune

Clipboard Control

Prevent copy/paste

Application Guard

Screen Capture Block

Prevent screenshots

Information Protection

Network Controls

Control
Purpose
Implementation

Egress Filtering

Block unauthorized transfers

Prisma Access

Category Blocking

Block file sharing sites

URL Filtering

Data Transfer Limits

Alert on large uploads

Network monitoring

DNS Monitoring

Detect tunneling

DNS security

SSL Inspection

Visibility into encrypted traffic

Prisma Access


🔒 Critical Reminder: Data exfiltration investigations often have legal, HR, and regulatory implications. Always coordinate with Legal and HR before taking action on insider threat cases. Preserve evidence meticulously with documented chain of custody. Be aware of privacy regulations that may affect investigation methods in different jurisdictions. Time is critical—once data leaves the organization, recovery may be impossible.

Last updated