We're updating the issue view to help you get more done. 

Data from Local System

Description

Sensitive data can be collected from local system sources, such as the file system or databases of information residing on the system prior to Exfiltration.

Adversaries will often search the file system on computers they have compromised to find files of interest. They may do this using a [Command-Line Interface](https://attack.mitre.org/techniques/T1059), such as [cmd](https://attack.mitre.org/software/S0106), which has functionality to interact with the file system to gather information. Some adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on the local system.

id

T1005

tactic

collection

datasources

Process command-line parameters
Process monitoring
File monitoring

maturity

Not Tracked

Assignee

Unassigned
Configure