Skip to main content
T1005Collectionmedium difficulty

Data from Local System

Data from Local System (T1005) is a MITRE ATT&CK technique in the Collection tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is Data from Local System?

Adversaries may search local system sources, such as file systems, configuration files, and local databases, to find files of interest and sensitive data prior to exfiltration. Adversaries may do this using a command shell (e.g., cmd) or scripting language (e.g., PowerShell) to search through the local file system, registry, and other data stores. Targeting of local data is common in both financially motivated attacks and espionage campaigns. Attackers typically search for documents containing sensitive business information, source code, customer data, intellectual property, financial records, and credentials. After identifying target files, attackers typically compress and encrypt the data before exfiltration to reduce transfer size and evade data loss prevention tools that inspect file contents. Understanding data collection behaviors is essential for building effective data-centric security monitoring.

Data from Local System is documented as technique T1005 in the MITRE ATT&CK knowledge base under the Collection tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Data from Local System activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor for mass file access events on endpoints, particularly processes reading large numbers of document files (Office documents, PDFs, text files) from user directories in short time periods suggesting automated collection.

  2. 2

    Alert on compression utility usage followed by large file creation in staging directories, as attackers typically archive collected data before exfiltration to reduce transfer size and potentially encrypt contents.

  3. 3

    Track access to sensitive data repositories including source code directories, financial document stores, and customer database exports, alerting on access by accounts or processes with no legitimate business need.

  4. 4

    Detect staging behavior by monitoring for large amounts of data being consolidated into single directories or archives before being moved toward network egress points or removable media.

  5. 5

    Monitor clipboard access by unusual processes on systems containing sensitive information, as attackers may use keyloggers and clipboard monitors to capture credentials and sensitive data as users interact with applications.

Example Alerts

These realistic alert examples show what Data from Local System looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighXDR

Mass Document Collection Script Executed

PowerShell script executed on executive workstation EX-WS-001 performing recursive search and copy of all .xlsx, .docx, .pdf, and .pptx files to a staging directory in C:\Users\Public. The script collected 2,847 documents totaling 4.3GB within 8 minutes. A 7zip compression process then created an encrypted archive of the staged files before network activity began toward an external destination.

CriticalXDR

Database Export File Created on Server

mysqldump process executed on database server DB-PROD-02 exporting the customer_data database containing 2.3 million customer records to a CSV file. The process was initiated by the web application service account, which has no legitimate reason to export full database contents. The export file was subsequently compressed and accessed by a process making network connections to an external IP address.

HighSIEM

Source Code Repository Cloned Locally

Git clone command executed by developer account on build server BUILD-01, cloning all 47 repositories from the internal GitLab instance to a local directory. This full repository clone representing 28GB of source code is unusual as developers typically clone only their working repositories. The account used has access to repositories outside its team scope due to overly permissive GitLab group settings.

Practice Detecting Data from Local System

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Data from Local System. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Data from Local System?
SOC analysts detect Data from Local System (T1005) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor for mass file access events on endpoints, particularly processes reading large numbers of document files (office documents, pdfs, text files) . SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Data from Local System?
Data from Local System can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the collection phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Data from Local System in real-world attacks?
Data from Local System is a well-documented MITRE ATT&CK technique in the Collection tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Data from Local System scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Data from Local System for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Collection techniques like Data from Local System. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Exfiltration? — SOC Glossary

Data exfiltration is the unauthorized transfer of sensitive data from a victim environment to attacker-controlled infras…

Read more
Glossary

What is DLP? — SOC Glossary

Data Loss Prevention (DLP) is a set of technologies and policies that detect and prevent unauthorized transmission, stor…

Read more
Glossary

What is SIEM? — SOC Glossary

Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…

Read more
Glossary

What is Log Management? — SOC Glossary

Log management is the process of collecting, normalizing, storing, retaining, and analyzing log data from across the IT …

Read more
Career Path

DFIR Analyst Career Guide — Salary & Skills

DFIR Analysts combine forensic investigation with incident response. You collect and analyze digital evidence from compr…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more
Feature

Shift Mode — Real-Time SOC Simulation

Practice alert triage under realistic time pressure with SLA timers and noise injection.

Read more

We use cookies to improve your experience and measure usage. Learn more