T1119 - Automated Collection
Tattiche:
Collection
Collection
Piattaforme:
IaaS Linux macOS Office Suite +2
IaaS Linux macOS Office Suite +2
Rilevamento:
Not specified
Not specified
Description:
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals.
In cloud-based environments, adversaries may also use cloud APIs, data pipelines, command line interfaces, or extract, transform, and load (ETL) services to automatically collect data.(Citation: Mandiant UNC3944 SMS Phishing 2023)
This functionality could also be built into remote access tools.
This technique may incorporate use of other techniques such as [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) and [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570) to identify and move files, as well as [Cloud Service Dashboard](https://attack.mitre.org/techniques/T1538) and [Cloud Storage Object Discovery](https://attack.mitre.org/techniques/T1619) to identify resources in cloud environments.
In cloud-based environments, adversaries may also use cloud APIs, data pipelines, command line interfaces, or extract, transform, and load (ETL) services to automatically collect data.(Citation: Mandiant UNC3944 SMS Phishing 2023)
This functionality could also be built into remote access tools.
This technique may incorporate use of other techniques such as [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) and [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570) to identify and move files, as well as [Cloud Service Dashboard](https://attack.mitre.org/techniques/T1538) and [Cloud Storage Object Discovery](https://attack.mitre.org/techniques/T1619) to identify resources in cloud environments.
Usato da Attori (20)
APT1
Nation-state
Nation-state
APT28
Nation-state
Nation-state
FIN6
Unknown
Unknown
OilRig
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
MUSTANG PANDA
Nation-state
Nation-state
FIN5
Unknown
Unknown
HAFNIUM
Unknown
Unknown
Winter Vivern
Unknown
Unknown
Ember Bear
Unknown
Unknown
Patchwork
Unknown
Unknown
Ke3chang
Unknown
Unknown
Chimera
Unknown
Unknown
menuPass
Unknown
Unknown
Tropic Trooper
Unknown
Unknown
RedCurl
Unknown
Unknown
Sidewinder
Unknown
Unknown
Confucius
Unknown
Unknown
Threat Group-3390
Unknown
Unknown
Agrius
Unknown
Unknown
Malware (20)
Proxysvc other
RotaJakiro other
WindTail other
Bankshot other
StrongPity other
AppleSeed other
NETWIRE other
LoFiSe other
InvisiMole other
VERMIN other
PACEMAKER other
Lumma Stealer other
Rover other
LightNeuron other
DarkGate other
Metamorfo other
T9000 other
Micropsia other
Attor other
Crutch other
Metadata
| MITRE ID: | T1119 |
| STIX ID: | attack-pattern--30208d3e-0d6b-... |
| Piattaforme: | IaaS, Linux, macOS, Office Suite, SaaS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |