“Introduction to Reverse Engineering Cocoa Applications” https://www.fireeye.com/blog/threat-research/2017/03/introduction_to_reve.html

@williballenthin