2019-10-22 11:00:52 +00:00
title : Data Compressed
status : experimental
description : An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network
2019-11-13 21:23:16 +00:00
author : Timur Zinniatullin, E.M. Anhaus, oscd.community
2019-11-04 19:55:32 +00:00
date : 2019 /10/21
modified : 2019 /11/04
2019-10-22 11:00:52 +00:00
references :
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1002/T1002.yaml
2019-11-13 21:23:16 +00:00
- https://eqllib.readthedocs.io/en/latest/analytics/1ec33c93-3d0b-4a28-8014-dbdaae5c60ae.html
2019-10-22 11:00:52 +00:00
logsource :
category : process_creation
product : windows
detection :
2019-11-04 19:55:32 +00:00
selection :
2019-11-07 22:34:30 +00:00
Image|endswith : '\rar.exe'
2019-11-13 21:23:16 +00:00
CommandLine|contains : ' a '
2019-11-04 19:55:32 +00:00
condition : selection
2019-10-22 11:00:52 +00:00
fields :
- Image
- CommandLine
- User
- LogonGuid
- Hashes
- ParentProcessGuid
- ParentCommandLine
falsepositives :
2019-11-04 19:55:32 +00:00
- highly likely if rar is default archiver in the monitored environment
2019-10-22 11:00:52 +00:00
level : low
tags :
- attack.exfiltration
- attack.t1002