🔏
RootGuard
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
      • Who Am I?
        • Professional Profile
  • Resources Hub
    • Blogs
      • Articles
        • Safeguarding SMEs: The Strategic Importance of a Security Operations Center (SOC)
      • Posts
        • Roadmap to Becoming a Cybersecurity Specialist
        • Starting a Career in Cybersecurity
        • A Guide to Landing Your First Cybersecurity Analyst Role
        • Moving from Intermediate to Expert Incident Responder
  • SOC Operations
    • Introduction
      • Development Resources
        • SOC Analysts Roadmap
        • Becoming A SOC Analyst
        • SOC Analysts Prep Interview Questions
    • Essential Skills
      • Critical Windows EventIDs to Monitor
    • Junior Analyst Skills
      • Splunk Use Cases
      • KQL Use Cases
        • Reconnaissance (TA0043)
        • Initial Access (TA0001)
        • Execution (TA0002)
        • Persistence (TA0003)
        • Privilege Escalation (TA0004)
        • Defence Evasion (TA0005)
        • Credential Access (TA0006)
        • Discovery (TA0007)
        • Lateral Movement (TA0008)
        • Collection (TA0009)
        • Command and Control (TA0011)
        • Exfiltration (TA0010)
        • Impact (TA0040)
      • Investigating Common Attacks
        • Domain Dominance Attacks - Detection & Analysis
        • Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
        • Authentication From Suspicious DeviceName
        • Identifying Interactive or RemoteInteractive Session From Service Account
        • Identifying Split or Part Archive File Transfers
        • Detect Potential Cleartext Credentials in Command Line
        • Detecting Command Line Interpreters Launched via Scheduled Tasks
        • Detecting Files Containing Potentially Sensitive Data
        • Detecting DeviceNetworkEvents From Windows Processes and Domains by TLD
        • Detecting Silent cmd.exe Execution With Redirected STDERR & STDOUT
        • Detecting Low Prevalence DLL Loaded From Process In User Downloads Directory
        • Detecting Virtual Drive Mounted From Archive
        • Identify Execution of Script From User's Downloads Folder
        • Identify Potential RDP Tunneled Sessions
        • Identify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClient
        • Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
        • Detect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
        • Detect Execution of PSEXESVC via Remote Systems
        • Identify Suspicious String in Service Creation ImagePath
        • Identify File with Double Extensions
        • Detect Potential Cleartext Credentials in Commandline
        • Detect When Large Number of Files Downloaded From OneDrive or SharePoint
        • Identify and Investigate Phishing Attacks with KQL
      • PowerShell for SecOps
        • Powershell Remoting
        • Reconnaissance Discovery
        • Initial Access Discovery
        • Execution Discovery
        • Persistence Discovery
        • Privilege Escalation Discovery
        • Defence Evasion Discovery
        • Credential Access Discovery
        • Discovery
        • Lateral Movement Discovery
        • Collection Discovery
        • Command & Control (C2) Discovery
        • Exfiltration Discovery
        • Impact Discovery
      • Packet Analysis (pcap)
        • Tcpdump
        • Tcpdump (Intermediate)
        • Tshark
        • Ngrep
      • Investigating Suspicious Emails Using KQL
    • Intermediate and Advanced Skills
      • Investigate Using MITRE ATT&CK Methodology
        • Reconnaissance (TA0043) Techniques
        • Resource Development (TA0042) Techniques
        • Initial Access (TA0001) Techniques
        • Command Execution (TA0002) Techniques
        • Persistence (TA0003) Techniques
        • Privilege Escalation (TA0004) Techniques
        • Defence Evasion (TA0005) Techniques
        • Credential Access (TA0006) Techniques
        • Discovery (TA0007) Techniques
        • Lateral Movement (TA0008) Techniques
        • Collection (TA0009) Techniques
        • Command and Control (C2) (TA0011) Techniques
        • Exfiltration (TA0010) Techniques
        • Impact (TA0040) Techniques
    • Vulnerability Management
    • Malware Analysis
  • DFIR
    • Incident Response
      • Incident Triage
        • Triage Types and Processes
        • PowerShell for Detection and Analysis
          • Malware or Compromise Investigation
          • Lateral Movement Discovery
        • Registry Analysis
        • Sysinternals Intrusion Analysis
        • PowerShell Intrusion Analysis
        • Velociraptor Intrusion Analysis
        • Zimmerman Tools Intrusion Analysis
      • KAPE Artifacts Analysis
      • Velociraptor Artifacts Analysis
      • Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks
        • Phase 1 - Gaining an Initial Foothold
          • Gaining Access to the Network
          • Establishing a Foothold
          • Network Discovery
      • Response Strategies
        • Privilege Escalation Assessment
        • Command and Control Assessment
        • Command Execution Assessment
        • Defence Evasion Assessment
        • Detection Assessment
        • Discovery Assessment
        • Exfiltration Assessment
        • Initial Access Assessment
        • Initial Impact Assessment Techniques
        • Lateral Movement Assessment
        • Persistence Assessment
    • Windows Forensics
      • Evidence of Execution
      • Window Artifact Analysis
        • Account Usage
        • User Activity Tracking (Event Logs)
        • Program Execution
        • File and Folder Opening
        • File Download
        • Browser Usage
        • Deleted File or File Knowledge
        • External Device & USB Usage
    • Linux Forensics
      • Linux Commandline Basics
      • Host Compromise Assessment
    • KQL for Defender & Sentinel
      • MDO (Office)
      • MDI (Identity)
      • MDE (Endpoint)
    • Memory Forensics
      • Memory Forensics (Volatility 3)
    • Playbooks
      • First Responder DFIR Playbook
        • Device Isolation
        • Evidence Collection
          • Acquire Triage Image Using KAPE
          • Acquire Triage Data Using Velociraptor
          • Acquire Triage Data Using Powershell
          • Acquire Triage Memory Image
          • Acquire Image Using FTK
          • AXIOM Cyber Data Collection
        • Windows Forensic Artefacts
          • Application Execution
          • File & Folder Knowledge
          • External Device Usage
          • Network Activity
          • Windows Event Logs
        • Initial Analysis
          • Memory Analysis (Vol 3)
          • Axiom Cyber Examiner
  • Detection Engineering
    • AD Attack Detections & Mitigations
      • Kerberoasting
      • Authentication Server Response (AS-REP) Roasting
      • Password Spraying
      • MachineAccountQuota Compromise
      • Unconstrained Delegation
      • Password in Group Policy Preferences (GPP) Compromise
      • Active Directory Certificate Services (AD CS) Compromise
      • Golden Certificate
      • DCSync
      • Dumping ntds.dit
      • Golden Ticket
      • Silver Ticket
      • Golden Security Assertion Markup Language (SAML)
      • Microsoft Entra Connect Compromise
      • One-way Domain Trust Bypass
      • Security Identifier (SID) History Compromise
      • Skeleton Key
      • Active Directory Security Controls
      • Active Directory Events for Detecting Compromise
    • Attack Triage Playbooks (KQL Triage)
      • Windows Malware Detection Playbook
      • Linux Host Intrusion Detection Playbook (CLI)
      • Linux Intrusion Detection Playbook
      • Large-Scale Compromise Detection Playbook
      • Ransomware Detection Playbook
      • Phishing Email Compromise Detection Playbook
      • Scam Detection Playbook
      • Customer Phishing Detection Playbook
      • Insider Abuse Detection Playbook
      • Information Leakage Detection Playbook
      • Social Engineering Detection Playbook
      • Malicious Network Behaviour Detection Playbook
      • Windows Intrusion Detection Playbook
      • Vulnerability Detection Playbook
      • Business Email Compromise Detection Playbook
    • Process Execution (KQL Triage)
    • Threat Hunting
      • Hunting Ransomware Indicators
      • Hunting With KQL
        • Detecting Malware Infection (MITRE ATT&CK: T1566, T1059)
        • Discovery Activities (MITRE ATT&CK: T1016, T1083, T1046)
        • Credential Theft (MITRE ATT&CK: T1003, T1078)
        • Lateral Movement (MITRE ATT&CK: T1076, T1021)
        • Data Theft (MITRE ATT&CK: T1041, T1071)
        • Detecting CommandLine Executions (MITRE ATT&CK: T1059)
        • Windows Security Logs (Identity and Logon Activities)
      • Hunting With Splunk
Powered by GitBook
On this page
  • Introduction
  • Using KQL to Investigate Data Exfiltration Activities in an Environment Using Defender/Sentinel
  • 1. T1048.003 - Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
  • 2. T1052.001 - Exfiltration Over Physical Medium: USB Drive
  • 3. T1041 - Exfiltration Over C2 Channel
  • 4. T1020 - Automated Exfiltration
  • 5. T1030 - Data Transfer Size Limits
Edit on GitHub
  1. SOC Operations
  2. Intermediate and Advanced Skills
  3. Investigate Using MITRE ATT&CK Methodology

Exfiltration (TA0010) Techniques

Introduction

Investigating data exfiltration forensically on workstations and server systems involves identifying and analysing how sensitive data was transferred from the network. This process is critical in understanding the scope of a security breach. Exfiltration can occur in various ways, including unauthorised email transmissions, external storage devices, cloud storage uploads, and covert channels.

Understanding Common Exfiltration Techniques

  • Email Transmission: Unauthorised sending of sensitive data via email.

  • Removable Media: Copying data to USB drives or other removable media.

  • Network Transfer: Utilising FTP, HTTP, or other protocols to transfer data to external servers.

  • Cloud Storage: Uploading data to cloud storage services.

  • Encrypted Channels: Using VPNs, SSH tunnels, or other encrypted methods to hide data transmission.

Data Collection and Preservation

  • Forensic Imaging: Create exact images of the hard drives of affected systems using tools like FTK Imager or dd.

  • Memory Capture: Use tools like Magnet RAM Capture or WinPmem to capture volatile memory.

  • Log Collection: Gather network logs, firewall logs, system logs, and application logs.

Email Analysis

  • Email Server Logs: Review logs for signs of large email transmissions or emails sent to unusual external addresses.

  • Email Client Analysis: Examine the email clients on affected systems for sent items, drafts, or deleted emails.

Removable Media Analysis

  • USB Device History: Windows stores a history of connected USB devices in the registry. Examine this for evidence of any unknown devices.

  • File System Analysis: Check for recently accessed files or file copies that coincide with the connection times of external media.

Network Traffic Analysis

  • Network Monitoring Tools: Use tools like Wireshark or Tcpdump to analyse captured network traffic for data transfers to unusual external IP addresses.

  • Firewall and Proxy Logs: Review logs for large data transfers or connections to known file-sharing or cloud storage sites.

Cloud Storage and Web Uploads

  • Browser History and Cookies: Examine web browser history and cookies for access to cloud storage websites.

  • Web Proxy Logs: Analyse web proxy logs for uploads to cloud services.

Analysing Encrypted Traffic

  • Decrypting Traffic: Where possible and legal, decrypt encrypted network traffic to inspect the contents.

  • TLS/SSL Certificate Analysis: Review certificates for any unrecognised or self-signed certificates that may have been used in exfiltration.

File Access and Movement Analysis

  • File Access Logs: Review logs for files being accessed that contain sensitive information.

  • Recent Documents and File Timestamps: Examine recent documents and file timestamps for evidence of copying or accessing large volumes of data.

Use of Specialised Forensic Tools

  • Forensic Suites: Tools like EnCase, Autopsy, or AXIOM Cyber for comprehensive analysis.

  • Network Analysis Tools: Wireshark, Tcpdump, NetWitness for network traffic analysis.

Documentation and Reporting

  • Detailed Documentation: Keep a detailed record of all findings, tools used, and investigative processes.

  • Forensic Report: Prepare a comprehensive report detailing the exfiltration methods identified, data compromised, and impact assessment.

Post-Investigation Actions

  • Mitigation and Remediation: Implement necessary security measures to prevent future incidents.

  • Recovery and Notifications: Follow organisational and legal protocols for data breach response, including notifying affected parties if necessary.

Key Considerations

  • Legal Compliance: Ensure the investigation complies with legal and regulatory requirements, especially when dealing with encrypted traffic and privacy-sensitive data.

  • Data Confidentiality: Maintain strict confidentiality and integrity of data throughout the investigation process.

  • Chain of Custody: Maintain a clear chain of custody for all evidence collected.

Forensic investigations of data exfiltration require careful analysis of various data sources and the application of appropriate forensic techniques. Tailoring the investigation to the specifics of the incident and the nature of the data involved is crucial.

Using KQL to Investigate Data Exfiltration Activities in an Environment Using Defender/Sentinel

Exfiltration techniques involve adversaries stealing data from a compromised network or system and transferring it to an external location under their control.

1. T1048.003 - Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol

Objective: Detect attempts to exfiltrate data using unencrypted or obfuscated protocols that are not typically used for Command and Control.

  1. Detect Data Exfiltration Over FTP

DeviceNetworkEvents | where RemotePort == 21 and RequestMethod == "PUT" | project Timestamp, DeviceName, RemoteIP, RequestMethod, InitiatingProcessAccountName

Purpose: Identify FTP PUT requests used to upload files to an external FTP server.

  1. Monitor for Exfiltration Over HTTP Using Non-Standard Ports

DeviceNetworkEvents | where NetworkProtocol == "HTTP" and RemotePort not in (80, 443) and RequestMethod == "POST" | project Timestamp, DeviceName, RemoteIP, RemotePort, RequestMethod, InitiatingProcessAccountName

Purpose: Detect HTTP POST requests on non-standard ports that may be used for exfiltration.

  1. Identify Large Data Transfers Over FTP

DeviceNetworkEvents | where RemotePort == 21 and TotalBytes > 10000000 | project Timestamp, DeviceName, RemoteIP, TotalBytes, InitiatingProcessAccountName

Purpose: Monitor for large file uploads over FTP, indicating potential data exfiltration.

  1. Detect Exfiltration Over SMTP

DeviceNetworkEvents | where RemotePort == 25 and RequestMethod == "DATA" | project Timestamp, DeviceName, RemoteIP, RequestMethod, InitiatingProcessAccountName

Purpose: Identify SMTP DATA commands that could be used to send sensitive data via email.

  1. Monitor for DNS-Based Exfiltration

DeviceNetworkEvents | where RemotePort == 53 and DNSQueryType not in ("A", "AAAA", "CNAME") | project Timestamp, DeviceName, RemoteIP, DNSQueryType, InitiatingProcessAccountName

Purpose: Detect DNS queries with uncommon record types, which could indicate DNS tunneling for data exfiltration.

  1. Identify Exfiltration Over ICMP

DeviceNetworkEvents | where NetworkProtocol == "ICMP" and TotalBytes > 1000 | project Timestamp, DeviceName, RemoteIP, TotalBytes, InitiatingProcessAccountName

Purpose: Monitor for large ICMP packets, which may be used to exfiltrate data.

2. T1052.001 - Exfiltration Over Physical Medium: USB Drive

Objective: Detect attempts to exfiltrate data via physical media, such as USB drives.

  1. Detect USB Drive Insertion

DeviceEvents | where ActionType == "RemovableMediaInserted" | project Timestamp, DeviceName, RemovableMediaName, InitiatingProcessAccountName

Purpose: Identify when a USB drive is inserted into a system, which could be used for data exfiltration.

  1. Monitor for File Transfers to USB Drives

DeviceFileEvents | where FolderPath startswith "E:\\" and FileOperation == "Create" | project Timestamp, DeviceName, FileName, FolderPath, FileOperation, InitiatingProcessAccountName

Purpose: Detect files being copied to a USB drive, which could indicate data exfiltration.

  1. Identify Execution of Files from USB Drives

DeviceProcessEvents | where FolderPath startswith "E:\\" and ProcessCommandLine has ".exe" | project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessAccountName

Purpose: Monitor for the execution of files directly from a USB drive.

  1. Detect Unusual Activity on USB Drives

DeviceFileEvents | where FolderPath startswith "E:\\" and FileOperation == "Delete" | project Timestamp, DeviceName, FileName, FolderPath, FileOperation, InitiatingProcessAccountName

Purpose: Identify file deletions on USB drives, which may be an attempt to cover tracks after data exfiltration.

  1. Monitor for Large Data Transfers to USB Drives

DeviceFileEvents | where FolderPath startswith "E:\\" and FileSize > 10000000 | project Timestamp, DeviceName, FileName, FolderPath, FileSize, InitiatingProcessAccountName

Purpose: Detect large files being transferred to a USB drive, indicating potential exfiltration.

  1. Identify Suspicious USB Drive Activity by Non-Admin Users

DeviceEvents | where ActionType == "RemovableMediaInserted" and InitiatingProcessAccountName != "Administrator" | project Timestamp, DeviceName, RemovableMediaName, InitiatingProcessAccountName

Purpose: Monitor for USB drive usage by non-admin users, which may be unusual in a secured environment.

3. T1041 - Exfiltration Over C2 Channel

Objective: Detect attempts to exfiltrate data over established Command and Control (C2) channels.

  1. Detect Data Sent to Known C2 Servers

DeviceNetworkEvents | where RemoteUrl contains_any ("malicious.com", "c2server.net") // replace with known C2 domains | project Timestamp, DeviceName, RemoteIP, RemoteUrl, TotalBytes, InitiatingProcessAccountName

Purpose: Identify data exfiltration attempts to known C2 servers.

  1. Monitor for Large POST Requests to External IPs

DeviceNetworkEvents | where RequestMethod == "POST" and TotalBytes > 100000 and RemoteIP != "192.168.1.1" // replace with internal IP range | project Timestamp, DeviceName, RemoteIP, TotalBytes, RequestMethod, InitiatingProcessAccountName

Purpose: Detect large POST requests to external IPs that could be used for data exfiltration.

  1. Identify Unusual C2 Channel Activity After Hours

DeviceNetworkEvents | where TimeGenerated between (startofday(ago(1d))) .. (endofday(ago(1d))) and RemoteUrl contains_any ("c2server.net", "malicious.com") | project Timestamp, DeviceName, RemoteUrl, RemoteIP, TotalBytes, InitiatingProcessAccountName

Purpose: Monitor for C2 channel activity outside of normal business hours, which could indicate exfiltration.

  1. Detect C2 Channels Using Non-Standard Ports

DeviceNetworkEvents | where RemotePort not in (80, 443) and RemoteUrl contains_any ("c2server.net", "malicious.com") | project Timestamp, DeviceName, RemoteIP, RemotePort, RemoteUrl, InitiatingProcessAccountName

Purpose: Identify C2 channels that are exfiltrating data using non-standard ports.

  1. Monitor for Encrypted Traffic to Untrusted IPs

DeviceNetworkEvents | where NetworkProtocol == "HTTPS" and RemoteIP not in ("192.168.1.0/24", "10.0.0.0/8") // replace with internal IP ranges | project Timestamp, DeviceName, RemoteIP, RemotePort, TotalBytes, InitiatingProcessAccountName

Purpose: Detect encrypted traffic to external IP addresses that could be exfiltrating data.

  1. Identify Suspicious DNS Tunneling Activity

DeviceNetworkEvents | where DNSQueryType not in ("A", "AAAA", "CNAME") and TotalBytes > 1000 | project Timestamp, DeviceName, RemoteIP, DNSQueryType, TotalBytes, InitiatingProcessAccountName

Purpose: Monitor for DNS tunneling activity that could be used for data exfiltration.

4. T1020 - Automated Exfiltration

Objective: Detect and investigate automated processes that continuously exfiltrate data from the environment.

  1. Detect Scheduled Tasks for Data Exfiltration

DeviceProcessEvents | where ProcessCommandLine has "schtasks" and ProcessCommandLine has_any ("export", "copy", "move") | project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessAccountName

Purpose: Identify scheduled tasks configured to automate data exfiltration.

  1. Monitor for Automated File Transfers

DeviceNetworkEvents | where RequestMethod == "PUT" and RemoteUrl contains_any (".ftp", ".sftp", ".http") | project Timestamp, DeviceName, RemoteIP, RequestMethod, TotalBytes, InitiatingProcessAccountName

Purpose: Detect automated file transfers to external servers.

  1. Identify Use of PowerShell for Automated Data Exfiltration

DeviceProcessEvents | where ProcessCommandLine has "powershell" and ProcessCommandLine has_any ("Start-Job", "Invoke-WebRequest", "Export-CSV") | project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessAccountName

Purpose: Monitor for PowerShell scripts that automate data exfiltration tasks.

  1. Detect Use of Automated Exfiltration Tools

DeviceProcessEvents | where ProcessCommandLine has_any ("rsync", "curl", "wget") | project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessAccountName

Purpose: Identify the use of tools that automate data transfers to external servers.

  1. Monitor for Continuous Network Activity to External IPs

DeviceNetworkEvents | where RemoteIP not in ("192.168.1.0/24", "10.0.0.0/8") // replace with internal IP ranges | summarize ContinuousConnection = count() by RemoteIP, DeviceName, InitiatingProcessAccountName | where ContinuousConnection > 100 | project Timestamp, DeviceName, RemoteIP, ContinuousConnection, InitiatingProcessAccountName

Purpose: Detect continuous or persistent network connections to external IPs that could indicate automated exfiltration.

  1. Identify Repeated Attempts to Exfiltrate Data

DeviceNetworkEvents | where RemoteIP not in ("192.168.1.0/24", "10.0.0.0/8") // replace with internal IP ranges | summarize RepeatAttempts = count() by RemoteIP, DeviceName, InitiatingProcessAccountName | where RepeatAttempts > 10 | project Timestamp, DeviceName, RemoteIP, RepeatAttempts, InitiatingProcessAccountName

Purpose: Monitor for repeated exfiltration attempts to external IPs.

5. T1030 - Data Transfer Size Limits

Objective: Detect and investigate attempts to exfiltrate data while staying under network or data transfer size limits to avoid detection.

  1. Detect Multiple Small Data Transfers

DeviceNetworkEvents | where TotalBytes < 50000 and RemoteIP not in ("192.168.1.0/24", "10.0.0.0/8") // replace with internal IP ranges | summarize TransferCount = count() by RemoteIP, DeviceName, InitiatingProcessAccountName | where TransferCount > 20 | project Timestamp, DeviceName, RemoteIP, TransferCount, InitiatingProcessAccountName

Purpose: Identify multiple small data transfers that could be an attempt to avoid detection.

  1. Monitor for Continuous Data Transfers Staying Below Size Limits

DeviceNetworkEvents | where TotalBytes between (10000 .. 50000) and RemoteIP not in ("192.168.1.0/24", "10.0.0.0/8") // replace with internal IP ranges | project Timestamp, DeviceName, RemoteIP, TotalBytes, InitiatingProcessAccountName

Purpose: Detect continuous data transfers that stay below common detection thresholds.

  1. Identify Repeated Small Exfiltration Attempts

DeviceNetworkEvents | where TotalBytes < 50000 and RequestMethod == "POST" | summarize RepeatAttempts = count() by RemoteIP, DeviceName, InitiatingProcessAccountName | where RepeatAttempts > 10 | project Timestamp, DeviceName, RemoteIP, RepeatAttempts, InitiatingProcessAccountName

Purpose: Monitor for repeated small exfiltration attempts via POST requests.

  1. Detect Stealthy Exfiltration Using Non-Standard Ports

DeviceNetworkEvents | where TotalBytes < 50000 and RemotePort not in (80, 443) | project Timestamp, DeviceName, RemoteIP, RemotePort, TotalBytes, InitiatingProcessAccountName

Purpose: Identify data exfiltration attempts using non-standard ports while keeping transfer sizes small.

  1. Monitor for Exfiltration Via Chunked Transfer Encoding

DeviceNetworkEvents | where RequestHeaders has "Transfer-Encoding: chunked" | project Timestamp, DeviceName, RemoteIP, RequestMethod, TotalBytes, InitiatingProcessAccountName

Purpose: Detect exfiltration attempts using chunked transfer encoding to bypass size limits.

  1. Identify Exfiltration Attempts to Unusual IPs

DeviceNetworkEvents | where RemoteIP not in ("192.168.1.0/24", "10.0.0.0/8") // replace with internal IP ranges | project Timestamp, DeviceName, RemoteIP, RemotePort, TotalBytes, InitiatingProcessAccountName

Purpose: Monitor for exfiltration attempts to unusual or unrecognized external IP addresses.

PreviousCommand and Control (C2) (TA0011) TechniquesNextImpact (TA0040) Techniques

Last updated 4 months ago