I have been analyzing a PDF
I suspect to contain malicious content. For the most part, I've always trusted automated tools to determine if a PDF was safe to open. However, my eyes have been opened to all the encryption and obfuscation techniques in the wild today. So I've started reviewing my PDFs manually using tools like these, and PDFStreamDumper. I have looked at the PDF specifications located here.
Everywhere I look, no one seems to explain the purpose of the /<Abbreviation>
directives. For example, the excerpt found in the header.
I can't find what /JT
references. Or why the /GoTo
does not specify a location.
The second object specifies /Cn
and /V
but I can't find these either.
The third object /Dt
and /JTM
, have no reference in the PDF specification. Can someone give me some direction. I'm willing to do the research but I'm not sure what I'm looking at besides abbreviated commands contained in an object. Is there a cheat sheet with these directives listed and their purpose?
Header
<<
/JT 2 0 R
/OpenAction
<<
/D [ 9 0 R /Fit ]
/S /GoTo
>>
/Outlines 8683 0 R
/PageLabels 8875 0 R
/PageLayout /SinglePage
/PageMode /UseOutlines
/Pages 5437 0 R
/Type /Catalog
>>
Second Object
<<
/A [ 3 0 R ]
/Cn [ 4 0 R ]
/V 1.1
>>
Third Object
<<
/Dt (D:20101223094432)
/JTM (Distiller)
>>
Note: I did run the file through Virus Total with just a few red flags. The pdf conforms with the 1.7 specs.