mirror of
https://github.com/valitydev/atomic-threat-coverage.git
synced 2024-11-06 17:45:23 +00:00
1.5 KiB
1.5 KiB
T1119 - Automated Collection
Description from ATT&CK
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of [Scripting](https://attack.mitre.org/techniques/T1064) to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. This functionality could also be built into remote access tools.This technique may incorporate use of other techniques such as File and Directory Discovery and Remote File Copy to identify and move files.
Atomic Tests
Atomic Test #1 - Automated Collection Command Prompt
Automated Collection
Supported Platforms: Windows
Run it with command_prompt
!
dir c: /b /s .docx | findstr /e .docx
for /R c: %f in (*.docx) do copy %f c:\temp\
Atomic Test #2 - Automated Collection PowerShell
Automated Collection
Supported Platforms: Windows
Run it with powershell
!
Get-ChildItem -Recurse -Include *.doc | % {Copy-Item $_.FullName -destination c:\temp}