Skip to main content
T1560Collectionmedium difficulty

Archive Collected Data

Archive Collected Data (T1560) is a MITRE ATT&CK technique in the Collection tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is Archive Collected Data?

An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network. Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender or network appliance. Archiving collected data is a critical step in the attack chain between collection and exfiltration that is often detectable if appropriate monitoring is in place. Common tools used for archiving include 7-Zip, WinRAR, tar, and zip. Attackers frequently use password-protected archives to prevent security tools from inspecting the contents. The combination of large file creation in temporary or unusual directories followed by network connections sending data in volumes matching the archive size is a reliable indicator of imminent data exfiltration.

Archive Collected Data is documented as technique T1560 in the MITRE ATT&CK knowledge base under the Collection tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Archive Collected Data activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor compression utility execution including 7z.exe, rar.exe, and zip.exe with password flags such as -p, -hp, and their equivalents, as password-protected archive creation is a strong indicator of data staging for exfiltration.

  2. 2

    Alert on large archive file creation in unusual directories such as temporary folders, user desktops, recycle bins, or hidden directories, particularly when the archive is created by a process with no legitimate archiving function.

  3. 3

    Correlate archive creation events with data access patterns, alerting when archive creation follows periods of mass file access across sensitive directories, indicating that collected data is being packaged for exfiltration.

  4. 4

    Detect split archive creation using multi-volume flags in compression tools, as attackers sometimes split large archives into smaller chunks to evade transfer size-based detection controls or to fit within exfiltration channel limitations.

  5. 5

    Monitor the size relationship between data accessed and archives created, as a rough size correlation between recently accessed files and a newly created archive provides strong evidence that the archive contains the accessed data staged for theft.

Example Alerts

These realistic alert examples show what Archive Collected Data looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighXDR

Password-Protected RAR Archive Created from Sensitive Files

rar.exe executed with -hp (encrypt headers and content) flag creating an archive containing files sourced from Finance and HR network shares. The 8.4GB archive was created in C:\Users\Public\Temp by a process that had accessed 12,000 files from these shares over the preceding 40 minutes. Password-protected archive creation immediately after mass file access is a reliable pre-exfiltration indicator requiring immediate investigation.

HighSIEM

7-Zip Used to Archive Source Code Repositories

Process monitoring detected 7z.exe archiving the contents of all local source code repositories into a single encrypted archive with maximum compression. The process was run by a developer account that had recently cloned all available repositories from the internal GitLab instance. The resulting 34GB archive was created in a hidden directory and subsequently transferred via SCP to an external server not part of the approved backup infrastructure.

CriticalSIEM

Staged Archive Created Before Network Egress Spike

Correlation rule triggered: file creation of 22GB compressed archive in C:\ProgramData\WindowsTemp\ at 01:47 AM, followed 4 minutes later by outbound HTTPS traffic spike to 45.142.212.100 sustaining 80Mbps for 37 minutes, consistent with the time required to transfer the archive. This staging-then-exfiltration pattern is the most reliable behavioral indicator of active data theft in progress.

Practice Detecting Archive Collected Data

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Archive Collected Data. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Archive Collected Data?
SOC analysts detect Archive Collected Data (T1560) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor compression utility execution including 7z.exe, rar.exe, and zip.exe with password flags such as -p, -hp, and their equivalents, as password-p. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Archive Collected Data?
Archive Collected Data can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the collection phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Archive Collected Data in real-world attacks?
Archive Collected Data is a well-documented MITRE ATT&CK technique in the Collection tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Archive Collected Data scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Archive Collected Data for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Collection techniques like Archive Collected Data. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Exfiltration? — SOC Glossary

Data exfiltration is the unauthorized transfer of sensitive data from a victim environment to attacker-controlled infras…

Read more
Glossary

What is DLP? — SOC Glossary

Data Loss Prevention (DLP) is a set of technologies and policies that detect and prevent unauthorized transmission, stor…

Read more
Glossary

What is SIEM? — SOC Glossary

Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…

Read more
Glossary

What is Log Management? — SOC Glossary

Log management is the process of collecting, normalizing, storing, retaining, and analyzing log data from across the IT …

Read more
Career Path

DFIR Analyst Career Guide — Salary & Skills

DFIR Analysts combine forensic investigation with incident response. You collect and analyze digital evidence from compr…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Data Exfiltration Investigation — Investigation Playbook

When monitoring detects large outbound data transfers, unusual cloud storage uploads, or archive file creation on sensit…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more

We use cookies to improve your experience and measure usage. Learn more