MCADDF

[COLLECT-FORM-001]: Form Responses & Survey Data

Metadata

| Attribute | Details | |—|—| | Technique ID | COLLECT-FORM-001 | | Technique Name | Form Responses & Survey Data Collection | | MITRE ATT&CK v18.1 | T1123 – Audio Capture | | Tactic | Collection (TA0009) | | Platforms | Microsoft 365, Microsoft Forms, SharePoint Online, OneDrive for Business | | Severity | High | | Technique Status | ACTIVE | | Last Verified | 2026-01-10 | | Affected Versions | Microsoft Forms in Microsoft 365, SharePoint Online, OneDrive for Business | | Patched In | Not applicable – relies on legitimate Forms export and automation features | | Author | SERVTEPArtur Pchelnikau |


2. EXECUTIVE SUMMARY

Operational Risk

Compliance Mappings

| Framework | Control / ID | Description | |—|—|—| | CIS Microsoft 365 | CIS O365 3.4, 3.10 | Control and monitor access to collaboration workloads and audit sensitive data exports. | | DISA STIG | O365-API-000010 | Ensure that API/connector access to O365 data is restricted and logged. | | CISA SCuBA | M365-AUD-1 | Enable unified audit logging and monitor high‑risk workloads such as Forms and SharePoint. | | NIST 800-53 | AC-6, AU-6, IP-1 | Limit access to sensitive survey data; review audit logs; protect PII. | | GDPR | Art. 5, Art. 6, Art. 32 | Lawful processing and security of personal data captured via online forms. | | DORA | Art. 9 | Protection of customer data and logging for critical services such as portals and surveys. | | NIS2 | Art. 21 | Risk management measures covering SaaS data collection mechanisms. | | ISO 27001 | A.8.12, A.8.16 | Protection and classification of information in applications (including survey tools). | | ISO 27005 | Online Survey Data Risk Scenario | Compromise of survey platform or exports leading to privacy and reputational damage. |


3. TECHNICAL PREREQUISITES

Supported Versions:


4. ENVIRONMENTAL RECONNAISSANCE

GUI Recon – Identify High‑Value Forms

  1. Browse to forms.office.com and sign in as the compromised user or admin.
  2. Review Owned forms, Shared with me, and Group forms.
  3. Identify forms with sensitive names (e.g., Employee Health Declaration, Customer KYC, Incident Report).

What to Look For:

Power Automate Recon

# Using PowerShell to list flows (requires Power Apps/Power Platform admin modules)
Get-AdminFlow -EnvironmentName Default-<GUID> | Select DisplayName, CreatedBy, Enabled

What to Look For:


5. DETAILED EXECUTION METHODS AND THEIRS STEPS

METHOD 1 – Direct Export of Responses from Microsoft Forms GUI

Supported Versions: All Forms instances in Microsoft 365.

Step 1: Export Responses to Excel

Objective: Obtain a full offline copy of all responses with minimal traces beyond normal user actions.

Manual Steps:

  1. Navigate to forms.office.com and open the targeted form.
  2. Select the Responses tab.
  3. Click Open results in Excel or Download a copy (depending on UI version).
  4. Save the exported workbook locally or to a synced OneDrive location.

Expected Output:

OpSec & Evasion:

Troubleshooting:


METHOD 2 – Abusing Power Automate to Stream Responses to SharePoint / OneDrive

Supported Versions: Power Automate in Microsoft 365 with Forms and SharePoint/Excel connectors.

Step 1: Create or Hijack a Flow for Continuous Export

Objective: Automatically duplicate every new response into an attacker‑controlled data store.

High‑Level Steps:

  1. In Power Automate, locate existing flows bound to the target form.
  2. Copy the flow or add additional actions:
    • Get response details (Microsoft Forms) using Response Id.
    • Add a row into a table in an Excel file under attacker‑controlled OneDrive/SharePoint.
    • Or Create item in an attacker‑controlled SharePoint list.
  3. Turn on the modified or cloned flow.

Example Flow Logic:

Expected Output:

OpSec & Evasion:

Troubleshooting:


METHOD 3 – Collecting From SharePoint/Excel Using PnP/Graph

Once responses are stored in SharePoint lists or Excel tables, attackers can reuse the metadata collection and list export techniques described in COLLECT-METADATA-001 and COLLECT-LIST-001.

Example (PnP.PowerShell – SharePoint list backing a form):

Connect-PnPOnline -Url "https://<tenant>.sharepoint.com/sites/FormsArchive" -Interactive
$ListName = "CustomerSurveyResponses"
$CSVPath  = "C:\Temp\CustomerSurveyResponses.csv"

$Items = Get-PnPListItem -List $ListName -PageSize 500
$Items | ForEach-Object {
  $fv = $_.FieldValuesAsText
  [PSCustomObject]@{
    ID        = $fv.ID
    Submitted = $fv.Created
    User      = $fv."Created By"
    Q1        = $fv.Q1
    Q2        = $fv.Q2
    Q3        = $fv.Q3
  }
} | Export-Csv $CSVPath -NoTypeInformation

6. ATTACK SIMULATION & VERIFICATION (Atomic Red Team)

As of 2026, there is no Atomic Red Team test dedicated to Microsoft Forms response collection. For this technique:

Generic T1123 Atomic tests (Audio Capture) can still be run to validate Collection tactic visibility on endpoints, but they do not mimic Forms behavior.


7. TOOLS & COMMANDS REFERENCE

Power Automate – Forms to SharePoint/Excel

Key Connectors:

Usage Pattern:

PnP.PowerShell / Graph

See COLLECT-METADATA-001 and COLLECT-LIST-001 for detailed cmdlets and scripts. They are reused for collecting Form responses once persisted to SharePoint lists or Excel tables.


8. SPLUNK DETECTION RULES

Rule 1: Unusual Export Activity in Microsoft Forms

Because Forms audit events are surfaced through the Unified Audit Log, Splunk detection focuses on the O365 audit feed.

Rule Configuration:

Conceptual SPL:

index=o365 Workload="MicrosoftForms"
| search Operation IN ("ViewedResponses", "ExportedResponses", "ViewedFormResponsesPage")
| stats count AS Ops BY UserId, FormName
| where Ops > 5

What This Detects:


9. MICROSOFT SENTINEL DETECTION

Query 1: High‑Frequency Access to Forms Responses

Rule Configuration:

KQL (conceptual):

OfficeActivity
| where TimeGenerated > ago(1h)
| where Workload == "MicrosoftForms"
| where Operation in ("ViewedResponses", "ExportedResponses", "ViewedFormResponsesPage")
| summarize Count = count() by UserId, Operation
| where Count > 5

What This Detects:


10. WINDOWS EVENT LOG MONITORING


11. SYSMON DETECTION PATTERNS

Sysmon can capture:

Example Sysmon filter (conceptual):

<FileCreate onmatch="include">
  <TargetFilename condition="contains">\\OneDrive -</TargetFilename>
  <TargetFilename condition="ends with">.xlsx</TargetFilename>
</FileCreate>

12. MICROSOFT DEFENDER FOR CLOUD

More directly relevant are Microsoft 365 Defender and Defender for Cloud Apps, which can alert on:

Use anomaly policies for mass download and unusual app behavior.


13. MICROSOFT PURVIEW (UNIFIED AUDIT LOG)

Query: Microsoft Forms Activity

Connect-ExchangeOnline
$Start = (Get-Date).AddDays(-7)
$End   = Get-Date

Search-UnifiedAuditLog -StartDate $Start -EndDate $End -ResultSize 5000 |
  Where-Object { $_.Workload -eq "MicrosoftForms" } |
  Export-Csv "C:\Temp\Forms_Audit.csv" -NoTypeInformation

14. DEFENSIVE MITIGATIONS

Priority 1: CRITICAL

Action 1: Governance for High‑Risk Forms

Manual Steps:

  1. Use Purview audit and PowerShell exports to inventory Forms usage.
  2. Work with data owners to retire obsolete forms and delete historical responses when no longer needed.

Action 2: Control Power Automate Connectors

Priority 2: HIGH


15. DETECTION & INCIDENT RESPONSE

Indicators of Compromise (IOCs)

Forensic Artifacts

Response Procedures

  1. Identify all locations where responses have been exported or duplicated.
  2. Suspend or delete malicious flows and revoke connectors.
  3. Work with legal/compliance to assess breach notification obligations.

Step Phase Technique Description
1 Initial Access IA-PHISH-001 – Device code phishing attacks Adversary gains user identity able to access Forms.
2 Privilege Escalation PE-ACCTMGMT-005 – PowerApps/Power Platform Escalation Gain control over Power Automate environment.
3 Current Step COLLECT-FORM-001 – Form Responses & Survey Data Export or continuously stream all responses.
4 Collection/Exfiltration CA-UNSC-014 – SaaS API key exposure Use keys/connectors to move data externally.
5 Impact REALWORLD-003 – POP/IMAP Basic Auth Abuse Use collected data for extortion, fraud and targeted phishing.

17. REAL-WORLD EXAMPLES

Example 1: HR Survey Data Exposure

Example 2: Rogue Flow Replicating Customer Feedback