Files
cti/enterprise-attack/attack-pattern/attack-pattern--41868330-6ee2-4d0f-b743-9f2294c3c9b6.json
2026-04-27 15:21:34 -04:00

66 lines
3.2 KiB
JSON

{
"type": "bundle",
"id": "bundle--5fef3bfd-005a-4a7f-b62c-d9dfddcb820d",
"spec_version": "2.0",
"objects": [
{
"type": "attack-pattern",
"id": "attack-pattern--41868330-6ee2-4d0f-b743-9f2294c3c9b6",
"created": "2020-02-20T21:08:52.529Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1560/002",
"external_id": "T1560.002"
},
{
"source_name": "libzip",
"description": "D. Baron, T. Klausner. (2020). libzip. Retrieved February 20, 2020.",
"url": "https://libzip.org/"
},
{
"source_name": "Zlib Github",
"description": "madler. (2017). zlib. Retrieved February 20, 2020.",
"url": "https://github.com/madler/zlib"
},
{
"source_name": "PyPI RAR",
"description": "mkz. (2020). rarfile 3.1. Retrieved February 20, 2020.",
"url": "https://pypi.org/project/rarfile/"
},
{
"source_name": "Wikipedia File Header Signatures",
"description": "Wikipedia. (2016, March 31). List of file signatures. Retrieved April 22, 2016.",
"url": "https://en.wikipedia.org/wiki/List_of_file_signatures"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"modified": "2025-10-24T17:48:42.345Z",
"name": "Archive via Library",
"description": "An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party libraries. Many libraries exist that can archive data, including [Python](https://attack.mitre.org/techniques/T1059/006) rarfile (Citation: PyPI RAR), libzip (Citation: libzip), and zlib (Citation: Zlib Github). Most libraries include functionality to encrypt and/or compress data.\n\nSome archival libraries are preinstalled on systems, such as bzip2 on macOS and Linux, and zip on Windows. Note that the libraries are different from the utilities. The libraries can be linked against when compiling, while the utilities require spawning a subshell, or a similar execution mechanism.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "collection"
}
],
"x_mitre_attack_spec_version": "3.2.0",
"x_mitre_deprecated": false,
"x_mitre_domains": [
"enterprise-attack"
],
"x_mitre_is_subtechnique": true,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_platforms": [
"Linux",
"macOS",
"Windows"
],
"x_mitre_version": "1.0"
}
]
}