Collection (TA0009) Techniques
Introduction
1. File Access in Sensitive Directories
DeviceFileEvents
| where ActionType in ("FileAccessed", "FileRead")
| where FolderPath startswith @"C:\Users" or FolderPath contains "SharedDrive"
| summarize Count = count() by FolderPath, InitiatingProcessFileName, AccountName, DeviceName, TimeGenerated
| order by Count descDeviceFileEvents
| where ActionType in ("FileAccessed", "FileRead")
| where FolderPath startswith @"C:\Users" or FolderPath contains "SharedDrive"
| where FileName endswith ".docx" or FileName endswith ".xlsx" or FileName endswith ".pdf" // Focus on sensitive documents
| join kind=inner (DeviceProcessEvents | where InitiatingProcessIntegrityLevel !contains "High") on $left.InitiatingProcessFileName == $right.InitiatingProcessFileName
| summarize Count = count() by FolderPath, FileName, InitiatingProcessFileName, AccountName, DeviceName, TimeGenerated
| order by Count desc2. Clipboard Monitoring
3. Keylogging Activity
4. Screen Capture
5. Archiving Sensitive Data
6. File Exfiltration
This investigative guide provides actionable steps for detecting adversary activity related to the Collection technique in a Windows environment. By using effective queries for quick insights and advanced queries for deeper correlations, security teams can uncover malicious behaviour, assess its impact, and respond effectively. Regular monitoring of these activities can help organisations minimise risks associated with data theft and maintain robust security.
Jump In
Last updated