Automated Collection
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. In cloud-based environments, adversaries may also use cloud APIs, data pipelines, command line interfaces, or extract, t...
BY SOURCE
PROCEDURES (8)
Auto-extracted: 2 detections for api
Auto-extracted: 2 detections for network connection monitoring
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for aws
Auto-extracted: 1 detections for service