TA0009 Collection

The adversary is trying to gather data of interest to their goal. Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to either steal (exfiltrate) the data or to use the data to gain more information about the target environment. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1113 Screen Capture 4 0
T1557 Adversary-in-the-Middle 54 4
T1602 Data from Configuration Repository 47 2
T1123 Audio Capture 3 0
T1114 Email Collection 31 3
T1025 Data from Removable Media 21 0
T1119 Automated Collection 26 0
T1115 Clipboard Data 5 0
T1530 Data from Cloud Storage 71 0
T1005 Data from Local System 21 0
T1560 Archive Collected Data 7 3
T1185 Browser Session Hijacking 23 0
T1125 Video Capture 3 0
T1074 Data Staged 2 1
T1039 Data from Network Shared Drive 3 0
T1056 Input Capture 5 4
T1213 Data from Information Repositories 45 5