Collection (TA0009) Techniques

Introduction

Threat Description and Potential Impact

The Collection technique under the MITRE ATT&CK framework involves adversaries gathering information of interest after gaining access to a system. This data may include sensitive files, user credentials, clipboard contents, screenshots, or logs. Collection activities are often preparatory steps for exfiltration and can significantly impact an organization's operations if left undetected. The compromise of intellectual property, customer data, financial records, or privileged credentials can lead to data breaches, financial loss, reputational damage, and compliance violations.

This guide explores investigative strategies for detecting collection activities using Kusto Query Language (KQL). Each technique is paired with a practical and advanced query to suit different levels of investigation complexity.


1. File Access in Sensitive Directories

Description: Adversaries may target sensitive files stored in user directories or shared network drives.

Effective Query

DeviceFileEvents
| where ActionType in ("FileAccessed", "FileRead")
| where FolderPath startswith @"C:\Users" or FolderPath contains "SharedDrive"
| summarize Count = count() by FolderPath, InitiatingProcessFileName, AccountName, DeviceName, TimeGenerated
| order by Count desc

Advanced Query

DeviceFileEvents
| where ActionType in ("FileAccessed", "FileRead")
| where FolderPath startswith @"C:\Users" or FolderPath contains "SharedDrive"
| where FileName endswith ".docx" or FileName endswith ".xlsx" or FileName endswith ".pdf"  // Focus on sensitive documents
| join kind=inner (DeviceProcessEvents | where InitiatingProcessIntegrityLevel !contains "High") on $left.InitiatingProcessFileName == $right.InitiatingProcessFileName
| summarize Count = count() by FolderPath, FileName, InitiatingProcessFileName, AccountName, DeviceName, TimeGenerated
| order by Count desc

2. Clipboard Monitoring

Description: Adversaries may monitor clipboard content to collect sensitive information like passwords or documents.

Effective Query

Advanced Query


3. Keylogging Activity

Description: Adversaries may use keylogging to capture user keystrokes, collecting credentials or sensitive data.

Effective Query

Advanced Query


4. Screen Capture

Description: Adversaries may capture screen content to gather sensitive information.

Effective Query

Advanced Query


5. Archiving Sensitive Data

Description: Adversaries may compress files for easier exfiltration.

Effective Query

Advanced Query


6. File Exfiltration

Description: Adversaries may exfiltrate data to external cloud storage or file-sharing services.

Effective Query

Advanced Query


Jump In

Last updated