Collection

Collection techniques are used by attackers to collect information through the cluster. This is typically exfiltration of data.