Collection (TA0009)
Sub-technique: T1119 - Automated Collection
Objective: Detect automated collection of data for exfiltration.
Identify Automated File Collection
DeviceFileEvents
| where FileName has_any ("robocopy", "xcopy", "copy")
| project Timestamp, DeviceName, FileName, FolderPath, InitiatingProcessAccountName, InitiatingProcessFolderPath
| order by Timestamp desc
// Extended Search
DeviceFileEvents
| where FileName has_any ("robocopy", "xcopy", "copy")
| summarize FileCopyCount = count() by DeviceName, FileName
| join kind=leftouter (
DeviceProcessEvents
| where ProcessCommandLine has_any ("robocopy", "xcopy", "copy")
| summarize ProcessCount = count() by DeviceName
) on DeviceName
| join kind=leftouter (
DeviceNetworkEvents
| where RemotePort == 3389
| summarize ConnectionCount = count() by DeviceName
) on DeviceName
| project DeviceName, FileName, FileCopyCount, ProcessCount, ConnectionCount
| order by FileCopyCount descPurpose: Detect automated file copying commands.
Detection of Large Data Archives
Purpose: Monitor the creation of large archive files.
Suspicious Data Collection Scripts
Purpose: Detect scripts or commands used for data collection.
Detect Collection of Network Traffic Data
Purpose: Identify network traffic data collection.
Monitor for Data Collection via PowerShell
Purpose: Detect PowerShell commands used to export data.
Detect Database Dumps
Purpose: Identify database dump commands.
Monitor for Automated Collection via Scripts
Purpose: Detect scripts used for data collection.
Identify Collection of Sensitive Files
Purpose: Monitor access to sensitive files.
Detect Use of Cloud Services for Data Collection
10. Monitor for Data Collection via Network Shares
Purpose: Identify data collection via network shares.
Last updated