Collection (TA0009) Techniques
Introduction
Threat Description and Potential Impact
The Collection technique under the MITRE ATT&CK framework involves adversaries gathering information of interest after gaining access to a system. This data may include sensitive files, user credentials, clipboard contents, screenshots, or logs. Collection activities are often preparatory steps for exfiltration and can significantly impact an organization's operations if left undetected. The compromise of intellectual property, customer data, financial records, or privileged credentials can lead to data breaches, financial loss, reputational damage, and compliance violations.
This guide explores investigative strategies for detecting collection activities using Kusto Query Language (KQL). Each technique is paired with a practical and advanced query to suit different levels of investigation complexity.
1. File Access in Sensitive Directories
Description: Adversaries may target sensitive files stored in user directories or shared network drives.
Effective Query
DeviceFileEvents
| where ActionType in ("FileAccessed", "FileRead")
| where FolderPath startswith @"C:\Users" or FolderPath contains "SharedDrive"
| summarize Count = count() by FolderPath, InitiatingProcessFileName, AccountName, DeviceName, TimeGenerated
| order by Count descAdvanced Query
DeviceFileEvents
| where ActionType in ("FileAccessed", "FileRead")
| where FolderPath startswith @"C:\Users" or FolderPath contains "SharedDrive"
| where FileName endswith ".docx" or FileName endswith ".xlsx" or FileName endswith ".pdf" // Focus on sensitive documents
| join kind=inner (DeviceProcessEvents | where InitiatingProcessIntegrityLevel !contains "High") on $left.InitiatingProcessFileName == $right.InitiatingProcessFileName
| summarize Count = count() by FolderPath, FileName, InitiatingProcessFileName, AccountName, DeviceName, TimeGenerated
| order by Count desc2. Clipboard Monitoring
Description: Adversaries may monitor clipboard content to collect sensitive information like passwords or documents.
Effective Query
Advanced Query
3. Keylogging Activity
Description: Adversaries may use keylogging to capture user keystrokes, collecting credentials or sensitive data.
Effective Query
Advanced Query
4. Screen Capture
Description: Adversaries may capture screen content to gather sensitive information.
Effective Query
Advanced Query
5. Archiving Sensitive Data
Description: Adversaries may compress files for easier exfiltration.
Effective Query
Advanced Query
6. File Exfiltration
Description: Adversaries may exfiltrate data to external cloud storage or file-sharing services.
Effective Query
Advanced Query
This investigative guide provides actionable steps for detecting adversary activity related to the Collection technique in a Windows environment. By using effective queries for quick insights and advanced queries for deeper correlations, security teams can uncover malicious behaviour, assess its impact, and respond effectively. Regular monitoring of these activities can help organisations minimise risks associated with data theft and maintain robust security.
Jump In
Last updated