Data Exfiltration Investigation Runbook
SOC & DFIR Operations Guide
Overview & Scope
What is Data Exfiltration?
Data at Risk Categories
Category
Examples
Sensitivity
Exfiltration Methods
By Channel
Channel
Description
Detection Difficulty
By Technique
Technique
Description
MITRE ID
By Actor Type
Actor
Motivation
Typical Methods
Data Exfiltration Lifecycle
Detection Sources & Data Mapping
Log Sources Matrix
Platform
Log Table
Exfiltration-Relevant Data
Critical Event Categories
File Operations
Event Type
Description
Risk Indicator
Network Activity
Event Type
Description
Risk Indicator
Email Activity
Event Type
Description
Risk Indicator
Cloud Activity
Event Type
Description
Risk Indicator
Windows Event IDs
Event ID
Log
Description
Relevance
Investigation Workflows
General Data Exfiltration Investigation
Step 1: Initial Triage
Step 2: User Context Analysis
Step 3: Activity Timeline Construction
Step 4: Exfiltration Channel Identification
Step 5: Data Impact Assessment
Step 6: Scope Expansion
Cloud Storage Exfiltration Investigation
Detection Indicators
Investigation Steps
Email-Based Exfiltration Investigation
Detection Indicators
Investigation Steps
Endpoint-Based Exfiltration Investigation
Detection Indicators
Investigation Steps
Network-Based Exfiltration Investigation
Detection Indicators
Investigation Steps
Insider Threat Investigation
Pre-Investigation Considerations
Risk Indicators
Indicator
Category
Weight
Investigation Steps
KQL Query Cheat Sheet
File Access Analysis
Mass File Access Detection
Sensitive File Access by Unusual Users
Archive Creation with Sensitive Files
File Copy to External Paths
USB/Removable Media Detection
USB Device Connections
Files Written to Removable Media
Cloud Storage Exfiltration
SharePoint/OneDrive Download Activity
External Sharing Detection
Anonymous Link Creation
Third-Party Cloud Storage Usage
Email Exfiltration Detection
Large Attachments to External Recipients
Emails to Personal Domains
Password-Protected Attachments (DLP Bypass)
Network Exfiltration Detection
Large Outbound Transfers
Transfers to File Sharing Sites
DNS Tunnelling Detection
After-Hours Large Transfers
Staging & Preparation Detection
Data Staging Directory Detection
Compression Tool Usage
Database Export Tools
DLP & Purview Alerts
DLP Policy Matches
Insider Risk Alerts
User Behaviour Analysis
User Data Access Baseline Comparison
Departing Employee Monitoring
Print Activity Detection
Mass Printing Detection
Sensitive Document Printing
Response Actions & Remediation
Immediate Containment Actions
Scenario
Action
Method
Account Containment
Data Access Revocation
Email Containment
Endpoint Containment
Evidence Preservation
Critical Evidence to Preserve
Evidence Type
Source
Retention
Evidence Collection Script
Quick Reference Cards
Exfiltration Indicator Checklist
File Activity Red Flags
Network Red Flags
Email Red Flags
Cloud Storage Red Flags
Endpoint Red Flags
Data Classification Quick Reference
Classification
Examples
Handling
Common Exfiltration Tools
Tool
Type
Indicators
Regulatory Considerations
Data Type
Regulations
Notification Requirements
Escalation Matrix
Severity Classification
Severity
Criteria
Response Time
Escalation Triggers
Condition
Escalation Level
External Notifications
Scenario
Notify
Timeline
MITRE ATT&CK Mapping
Exfiltration (TA0010)
Technique
ID
Description
Detection
Collection (TA0009) - Pre-Exfiltration
Technique
ID
Description
Detection
Related Techniques
Tactic
Technique
ID
Relevance
Appendix: Investigation Commands
File Access Analysis
Network Transfer Analysis
Cloud Activity Analysis
Email Analysis
USB/Removable Media Analysis
Comprehensive User Activity Export
Prevention & Hardening
DLP Policy Recommendations
Policy
Scope
Action
Endpoint Controls
Control
Purpose
Implementation
Network Controls
Control
Purpose
Implementation
PreviousBusiness Email Compromise (BEC) Investigation RunbookNextRansomware Investigation & Response Runbook
Last updated