Collection (TA0009)

Sub-technique: T1119 - Automated Collection

Objective: Detect automated collection of data for exfiltration.

  1. Identify Automated File Collection

DeviceFileEvents
| where FileName has_any ("robocopy", "xcopy", "copy")
| project Timestamp, DeviceName, FileName, FolderPath, InitiatingProcessAccountName, InitiatingProcessFolderPath
| order by Timestamp desc

// Extended Search
DeviceFileEvents
| where FileName has_any ("robocopy", "xcopy", "copy")
| summarize FileCopyCount = count() by DeviceName, FileName
| join kind=leftouter (
    DeviceProcessEvents
    | where ProcessCommandLine has_any ("robocopy", "xcopy", "copy")
    | summarize ProcessCount = count() by DeviceName
) on DeviceName
| join kind=leftouter (
    DeviceNetworkEvents
    | where RemotePort == 3389
    | summarize ConnectionCount = count() by DeviceName
) on DeviceName
| project DeviceName, FileName, FileCopyCount, ProcessCount, ConnectionCount
| order by FileCopyCount desc

Purpose: Detect automated file copying commands.

  1. Detection of Large Data Archives

Purpose: Monitor the creation of large archive files.

  1. Suspicious Data Collection Scripts

Purpose: Detect scripts or commands used for data collection.

  1. Detect Collection of Network Traffic Data

Purpose: Identify network traffic data collection.

  1. Monitor for Data Collection via PowerShell

Purpose: Detect PowerShell commands used to export data.

  1. Detect Database Dumps

Purpose: Identify database dump commands.

  1. Monitor for Automated Collection via Scripts

Purpose: Detect scripts used for data collection.

  1. Identify Collection of Sensitive Files

Purpose: Monitor access to sensitive files.

  1. Detect Use of Cloud Services for Data Collection

10. Monitor for Data Collection via Network Shares

Purpose: Identify data collection via network shares.

Last updated