Data Compressed - T1002 (b9f5dbe2-4c55-4fc5-af2e-d42c1d182ec4)
An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network. The compression is done separately from the exfiltration channel and is performed using a custom program or algorithm, or a more common compression library or utility such as 7zip, RAR, ZIP, or zlib.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Data Compressed - T1002 (b9f5dbe2-4c55-4fc5-af2e-d42c1d182ec4) | Attack Pattern | Archive Collected Data - T1560 (53ac20cd-aca3-406e-9aa0-9fc7fdc60a5a) | Attack Pattern | 1 |