type
stringclasses 1
value | id
stringclasses 1
value | spec_version
float64 2.1
2.1
| objects
dict |
---|---|---|---|
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Pegasus for Android](https://attack.mitre.org/software/S0316) accesses contact list information.(Citation: Lookout-PegasusAndroid)",
"external_references": [
{
"description": "Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017.",
"external_id": null,
"source_name": "Lookout-PegasusAndroid",
"url": "https://blog.lookout.com/blog/2017/04/03/pegasus-android/"
}
],
"first_seen": null,
"id": "relationship--e84ad4b0-9f7a-48a5-89ae-33804b11eb56",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:12:22.002Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--93799a9d-3537-43d8-b6f4-17215de1657c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-14T15:02:35.238Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Asacub](https://attack.mitre.org/software/S0540) has been spread via phishing SMS messages that contain a link to a website that hosts the malicious APK file.(Citation: Securelist Asacub)",
"external_references": [
{
"description": "T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020.",
"external_id": null,
"source_name": "Securelist Asacub",
"url": "https://securelist.com/the-rise-of-mobile-banker-asacub/87591/"
}
],
"first_seen": null,
"id": "relationship--be92314d-bf3f-4a02-852b-3d1ab85e8d7d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--a76b837b-93cc-417d-bf28-c47a6a284fa4",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-10-01T14:42:49.159Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[BusyGasper](https://attack.mitre.org/software/S0655) can utilize the device’s sensors to determine when the device is in use and subsequently hide malicious activity. When active, it attempts to hide its malicious activity by turning the screen’s brightness as low as possible and muting the device.(Citation: SecureList BusyGasper)",
"external_references": [
{
"description": "Alexey Firsh. (2018, August 29). BusyGasper – the unfriendly spy. Retrieved October 1, 2021.",
"external_id": null,
"source_name": "SecureList BusyGasper",
"url": "https://securelist.com/busygasper-the-unfriendly-spy/87627/"
}
],
"first_seen": null,
"id": "relationship--c2536a3c-bb84-42b7-8ac6-05f26205a4ad",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-12T10:01:44.682Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T18:50:43.393Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may inject code into processes in order to evade process-based defenses or even elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process. \n\nBoth Android and iOS have no legitimate way to achieve process injection. The only way this is possible is by abusing existing root access or exploiting a vulnerability.",
"external_references": [
{
"description": null,
"external_id": "T1631",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1631"
}
],
"first_seen": null,
"id": "attack-pattern--b7c0e45f-0206-4f75-96e7-fe7edad3aaff",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "defense-evasion"
},
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "privilege-escalation"
}
],
"last_seen": null,
"modified": "2023-03-20T18:55:54.442Z",
"name": "Process Injection",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Application vetting services could look for misuse of dynamic libraries.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-11-21T16:42:48.490Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[ViceLeaker](https://attack.mitre.org/software/S0418) can obtain a list of installed applications.(Citation: SecureList - ViceLeaker 2019)",
"external_references": [
{
"description": "GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019.",
"external_id": null,
"source_name": "SecureList - ViceLeaker 2019",
"url": "https://securelist.com/fanning-the-flames-viceleaker-operation/90877/"
}
],
"first_seen": null,
"id": "relationship--50bab448-fee6-49e9-a296-498fe06eacc7",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-11-21T16:42:48.490Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--6fcaf9b0-b509-4644-9f93-556222c81ed2",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-07-10T15:25:57.607Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FinFisher](https://attack.mitre.org/software/S0182) exfiltrates data over commonly used ports, such as ports 21, 53, and 443.(Citation: Lookout Dark Caracal Jan 2018)",
"external_references": [
{
"description": "Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.",
"external_id": null,
"source_name": "Lookout Dark Caracal Jan 2018",
"url": "https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf"
}
],
"first_seen": null,
"id": "relationship--29c45d94-f985-4128-b845-bf1159d606cb",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--a5528622-3a8a-4633-86ce-8cdaf8423858",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--3911658a-6506-4deb-9ab4-595a51ae71ad",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-28T19:25:38.355Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Security updates may contain patches that inhibit system software compromises.",
"external_references": null,
"first_seen": null,
"id": "relationship--94e111fa-81d1-4882-ae73-4d6ad6367b9f",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-28T19:25:38.355Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:21.023Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM) / mobile device management (MDM) server console could use that access to track mobile devices.(Citation: Krebs-Location)",
"external_references": [
{
"description": null,
"external_id": "T1468",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1468"
},
{
"description": "Brian Krebs. (2018, May 17). Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site. Retrieved November 8, 2018.",
"external_id": null,
"source_name": "Krebs-Location",
"url": "https://krebsonsecurity.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site/"
},
{
"description": null,
"external_id": "ECO-5",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html"
},
{
"description": null,
"external_id": "EMM-7",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html"
}
],
"first_seen": null,
"id": "attack-pattern--6f86d346-f092-4abc-80df-8558a90c426a",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "remote-service-effects"
}
],
"last_seen": null,
"modified": "2022-04-05T19:40:25.068Z",
"name": "Remotely Track Device Without Authorization",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": true,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity. Apple iCloud also provides notifications to users of account activity.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Without Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Skygofree](https://attack.mitre.org/software/S0327) has the capability to exploit several known vulnerabilities and escalate privileges.(Citation: Kaspersky-Skygofree)",
"external_references": [
{
"description": "Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018.",
"external_id": null,
"source_name": "Kaspersky-Skygofree",
"url": "https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/"
}
],
"first_seen": null,
"id": "relationship--dfe6d454-1a24-4c42-97eb-4ddfd1dbb09b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--3a913bac-4fae-4d0e-bca8-cae452f1599b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-15T20:20:59.296Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Mandrake](https://attack.mitre.org/software/S0485) can collect the device’s location.(Citation: Bitdefender Mandrake)",
"external_references": [
{
"description": "R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020.",
"external_id": null,
"source_name": "Bitdefender Mandrake",
"url": "https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf"
}
],
"first_seen": null,
"id": "relationship--ba5fc090-d420-4006-9dc0-57b75260b5f6",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-07-15T20:20:59.296Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--52c994fa-b6c8-45a8-9586-a4275cf19307",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-10-10T15:33:58.272Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[XLoader for Android](https://attack.mitre.org/software/S0318) has masqueraded as an Android security application.(Citation: TrendMicro-XLoader-FakeSpy)",
"external_references": [
{
"description": "Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020.",
"external_id": null,
"source_name": "TrendMicro-XLoader-FakeSpy",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/"
}
],
"first_seen": null,
"id": "relationship--e245ad04-3fe9-4132-8bb4-77cdc4c3a1eb",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-10-10T15:33:58.272Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-24T21:45:56.981Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SilkBean](https://attack.mitre.org/software/S0549) has access to the device’s location.(Citation: Lookout Uyghur Campaign)",
"external_references": [
{
"description": "A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020.",
"external_id": null,
"source_name": "Lookout Uyghur Campaign",
"url": "https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf"
}
],
"first_seen": null,
"id": "relationship--d0c039cb-c815-4d9c-a100-a45f923bc65b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-12-24T21:45:56.981Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--ddbe5657-e21e-4a89-8221-2f1362d397ec",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T13:17:52.740Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may utilize standard operating system APIs to gather contact list data. On Android, this can be accomplished using the Contacts Content Provider. On iOS, this can be accomplished using the `Contacts` framework. \n\n \n\nIf the device has been jailbroken or rooted, an adversary may be able to access the [Contact List](https://attack.mitre.org/techniques/T1636/003) without the user’s knowledge or approval. ",
"external_references": [
{
"description": null,
"external_id": "T1636.003",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1636/003"
},
{
"description": null,
"external_id": "APP-13",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html"
}
],
"first_seen": null,
"id": "attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "collection"
}
],
"last_seen": null,
"modified": "2023-03-20T15:40:11.937Z",
"name": "Contact List",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "On both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application’s manifest, or `NSContactsUsageDescription` in an iOS application’s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": true,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"iOS",
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.743Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--9adde9d7-4ba0-4e35-93ba-1e85e9eb16bc",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2018-10-23T00:14:20.652Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b928b94a-4966-4e2a-9e61-36505b896ebc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T15:43:49.309Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Cerberus](https://attack.mitre.org/software/S0480) can send SMS messages from a device.(Citation: Threat Fabric Cerberus)",
"external_references": [
{
"description": "Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020.",
"external_id": null,
"source_name": "Threat Fabric Cerberus",
"url": "https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html"
}
],
"first_seen": null,
"id": "relationship--78fc4506-5c80-4638-8f51-44a2e28f7aaf",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-09-11T15:43:49.309Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-14T15:32:11.813Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SimBad](https://attack.mitre.org/software/S0419) was distributed via the Google Play Store.(Citation: CheckPoint SimBad 2019)",
"external_references": [
{
"description": "Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019.",
"external_id": null,
"source_name": "CheckPoint SimBad 2019",
"url": "https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/"
}
],
"first_seen": null,
"id": "relationship--2758c6ce-8c56-462f-8cbc-fb32ab098646",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--f79c01eb-2954-40d8-a819-00b342f47ce7",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.736Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Decrease likelihood of successful privilege escalation attack.",
"external_references": null,
"first_seen": null,
"id": "relationship--93a524e2-cb17-4b40-8640-a03949e89775",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-16T16:33:56.014Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Chameleon](https://attack.mitre.org/software/S1083) can log keystrokes and gather the lock screen password of an infected device by abusing Accessibility Services.(Citation: cyble_chameleon_0423)",
"external_references": [
{
"description": "Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023.",
"external_id": null,
"source_name": "cyble_chameleon_0423",
"url": "https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/"
}
],
"first_seen": null,
"id": "relationship--75a8614f-bf92-455d-b2ef-7085aff9a64d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-15T19:16:57.874Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-04T18:58:19.825Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Hornbill](https://attack.mitre.org/software/S1077) can exfiltrate data back to the C2 server using HTTP.(Citation: lookout_hornbill_sunbird_0221) ",
"external_references": [
{
"description": "Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023.",
"external_id": null,
"source_name": "lookout_hornbill_sunbird_0221",
"url": "https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict"
}
],
"first_seen": null,
"id": "relationship--7bc6460d-b36e-41ed-baa0-82d54ec19e57",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-04T18:58:58.480Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T18:48:03.156Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--cb80178a-5f9c-41bd-95a2-a7c5fe23c12c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-01T18:48:03.156Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "subtechnique-of",
"revoked": false,
"source_ref": "attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Trojan-SMS.AndroidOS.OpFake.a](https://attack.mitre.org/software/S0308) uses Google Cloud Messaging (GCM) for command and control.(Citation: Kaspersky-MobileMalware)",
"external_references": [
{
"description": "Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016.",
"external_id": null,
"source_name": "Kaspersky-MobileMalware",
"url": "https://securelist.com/mobile-malware-evolution-2013/58335/"
}
],
"first_seen": null,
"id": "relationship--2cdd5474-620c-499e-8b9c-835505febc2c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:00:45.438Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--d89c132d-7752-4c7f-9372-954a71522985",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T20:15:43.636Z",
"created_by_ref": null,
"definition": null,
"definition_type": null,
"description": "Adversaries may employ a known asymmetric encryption algorithm to conceal command and control traffic, rather than relying on any inherent protections provided by a communication protocol. Asymmetric cryptography, also known as public key cryptography, uses a keypair per party: one public that can be freely distributed, and one private that should not be distributed. Due to how asymmetric algorithms work, the sender encrypts data with the receiver’s public key and the receiver decrypts the data with their private key. This ensures that only the intended recipient can read the encrypted data. Common public key encryption algorithms include RSA, ElGamal, and ECDSA.\n\nFor efficiency, many protocols (including SSL/TLS) use symmetric cryptography once a connection is established, but use asymmetric cryptography to establish or transmit a key. As such, these protocols are classified as [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1521/002).",
"external_references": [
{
"description": null,
"external_id": "T1521.002",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1521/002"
}
],
"first_seen": null,
"id": "attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "command-and-control"
}
],
"last_seen": null,
"modified": "2022-04-05T20:16:21.324Z",
"name": "Asymmetric Cryptography",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": true,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-16T20:16:08.068Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Device attestation can often detect jailbroken or rooted devices.",
"external_references": null,
"first_seen": null,
"id": "relationship--00e80df1-33e4-4b1b-8c6b-79197945c4e5",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e083305c-49e7-4c87-aae8-9689213bffbe",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-20T13:58:53.422Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[XLoader for iOS](https://attack.mitre.org/software/S0490) is a malicious iOS application that is capable of gathering system information.(Citation: TrendMicro-XLoader-FakeSpy) It is tracked separately from the [XLoader for Android](https://attack.mitre.org/software/S0318).",
"external_references": [
{
"description": null,
"external_id": "S0490",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S0490"
},
{
"description": "Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020.",
"external_id": null,
"source_name": "TrendMicro-XLoader-FakeSpy",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/"
}
],
"first_seen": null,
"id": "malware--29944858-da52-4d3d-b428-f8a6eb8dde6f",
"identity_class": null,
"is_family": true,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2021-12-07T14:46:08.852Z",
"name": "XLoader for iOS",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": null,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "malware",
"x_mitre_aliases": [
"XLoader for iOS"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-14T14:13:45.253Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[eSurv](https://attack.mitre.org/software/S0507) can record audio.(Citation: Lookout eSurv)",
"external_references": [
{
"description": "A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "Lookout eSurv",
"url": "https://blog.lookout.com/esurv-research"
}
],
"first_seen": null,
"id": "relationship--146275c0-b6dd-4700-bded-bc361a67d023",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-09-14T14:13:45.253Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--680f680c-eef9-4f8a-b5f5-f451bf47e403",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T20:08:00.760Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Gustuff](https://attack.mitre.org/software/S0406) communicates with the command and control server using HTTP requests.(Citation: Talos Gustuff Apr 2019)",
"external_references": [
{
"description": "Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019.",
"external_id": null,
"source_name": "Talos Gustuff Apr 2019",
"url": "https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html"
}
],
"first_seen": null,
"id": "relationship--a5dac41f-4a16-44ea-b279-b84c927ce62d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:11:36.853Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Pegasus for Android attempts to detect whether it is running in an emulator rather than a real device.",
"external_references": [
{
"description": "Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017.",
"external_id": null,
"source_name": "Lookout-PegasusAndroid",
"url": "https://blog.lookout.com/blog/2017/04/03/pegasus-android/"
}
],
"first_seen": null,
"id": "relationship--0e81eb1d-cd1e-43e1-8c09-03927681ce76",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2018-10-23T00:14:20.652Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--93799a9d-3537-43d8-b6f4-17215de1657c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:21.354Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An adversary could set up unauthorized Wi-Fi access points or compromise existing access points and, if the device connects to them, carry out network-based attacks such as eavesdropping on or modifying network communication(Citation: NIST-SP800153)(Citation: Kaspersky-DarkHotel).",
"external_references": [
{
"description": null,
"external_id": "T1465",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1465"
},
{
"description": "Alex Drozhzhin. (2014, November 10). Darkhotel: a spy campaign in luxury Asian hotels. Retrieved December 24, 2016.",
"external_id": null,
"source_name": "Kaspersky-DarkHotel",
"url": "https://blog.kaspersky.com/darkhotel-apt/6613/"
},
{
"description": "M. Souppaya and K. Scarfone. (2012, February). NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs). Retrieved December 24, 2016.",
"external_id": null,
"source_name": "NIST-SP800153",
"url": "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf"
},
{
"description": null,
"external_id": "LPN-0",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-0.html"
}
],
"first_seen": null,
"id": "attack-pattern--633baf01-6de4-4963-bb54-ff6c6357bed3",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "network-effects"
}
],
"last_seen": null,
"modified": "2022-04-06T15:51:11.938Z",
"name": "Rogue Wi-Fi Access Points",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": true,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Without Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-07-10T15:35:43.704Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Pallas](https://attack.mitre.org/software/S0399) exfiltrates data using HTTP.(Citation: Lookout Dark Caracal Jan 2018)",
"external_references": [
{
"description": "Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.",
"external_id": null,
"source_name": "Lookout Dark Caracal Jan 2018",
"url": "https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf"
}
],
"first_seen": null,
"id": "relationship--fb587f81-1300-438d-a33b-f8d08530788b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:41:13.182Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:41:18.288Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)",
"external_references": [
{
"description": "Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022.",
"external_id": null,
"source_name": "Samsung Knox Mobile Threat Defense",
"url": "https://partner.samsungknox.com/mtd"
}
],
"first_seen": null,
"id": "relationship--82b58c75-239e-4dac-b848-bc1f3354adc4",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-07T22:14:04.455Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:11:37.251Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--1121d23e-a20a-4de2-a1d6-e0d519664850",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-11T20:06:56.034Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--56a255a5-9fa2-45bb-8848-fd0a68514467",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-11T20:06:56.034Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "revoked-by",
"revoked": false,
"source_ref": "attack-pattern--2f0e8d80-4b8b-4f4a-b5cc-132afe7e057d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-12-10T16:07:41.048Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Dvmap](https://attack.mitre.org/software/S0420) was delivered via the Google Play Store. It evaded Google Play Store checks by uploading a clean application, and replacing it with a malicious version for a short period of time. This occurred at least 5 times in a one month period.(Citation: SecureList DVMap June 2017)",
"external_references": [
{
"description": "R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019.",
"external_id": null,
"source_name": "SecureList DVMap June 2017",
"url": "https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/"
}
],
"first_seen": null,
"id": "relationship--28638246-abfb-4964-aa0f-57eb825338cc",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--22b596a6-d288-4409-8520-5f2846f85514",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T18:15:03.625Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--07fd2c39-c3e2-4044-b00b-71250cd7df2e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-30T18:15:03.625Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "subtechnique-of",
"revoked": false,
"source_ref": "attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-16T16:44:30.692Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Chameleon](https://attack.mitre.org/software/S1083) can send stolen data over HTTP.(Citation: cyble_chameleon_0423)",
"external_references": [
{
"description": "Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023.",
"external_id": null,
"source_name": "cyble_chameleon_0423",
"url": "https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/"
}
],
"first_seen": null,
"id": "relationship--3fdb8bfb-1b2d-4fac-bb41-d26a5ad18dbb",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-16T16:44:30.692Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[RedDrop](https://attack.mitre.org/software/S0326) contains malicious embedded files, which are compiled to initiate the malicious functionality.",
"external_references": [
{
"description": "Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018.",
"external_id": null,
"source_name": "Wandera-RedDrop",
"url": "https://www.wandera.com/reddrop-malware/"
}
],
"first_seen": null,
"id": "relationship--2979b822-3f0e-4cd6-b2dc-ea6da72008ed",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-08-07T15:57:13.417Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Riltok](https://attack.mitre.org/software/S0403) can query various details about the device, including phone number, country, mobile operator, model, root availability, and operating system version.(Citation: Kaspersky Riltok June 2019)",
"external_references": [
{
"description": "Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019.",
"external_id": null,
"source_name": "Kaspersky Riltok June 2019",
"url": "https://securelist.com/mobile-banker-riltok/91374/"
}
],
"first_seen": null,
"id": "relationship--7b8c3ae2-7e52-4f1d-ad30-788b367a7531",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--c0efbaae-9e7d-4716-a92d-68373aac7424",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-07-26T14:26:57.207Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Android 10 prevents applications from accessing clipboard data unless the application is on the foreground or is set as the device’s default input method editor (IME).(Citation: Android 10 Privacy Changes)",
"external_references": [
{
"description": "Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019.",
"external_id": null,
"source_name": "Android 10 Privacy Changes",
"url": "https://developer.android.com/about/versions/10/privacy/changes#clipboard-data"
}
],
"first_seen": null,
"id": "relationship--409570bb-77c9-4021-920e-1600a7f4efbd",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e399430e-30b7-48c5-b70a-f44dc8c175cb",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:01:39.599Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AbstractEmu](https://attack.mitre.org/software/S1061) can grant itself contact list access.(Citation: lookout_abstractemu_1021)",
"external_references": [
{
"description": "P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023.",
"external_id": null,
"source_name": "lookout_abstractemu_1021",
"url": "https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign"
}
],
"first_seen": null,
"id": "relationship--eba4b561-84c9-4d49-a8b8-1842c3ed94f3",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-03-27T17:25:11.903Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--2aec175b-4429-4048-8e09-3ef6cbecfc64",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T19:19:09.046Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has been identified in 42 apps in the Google Play Store.(Citation: WeLiveSecurity AdDisplayAshas)",
"external_references": [
{
"description": "L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020.",
"external_id": null,
"source_name": "WeLiveSecurity AdDisplayAshas",
"url": "https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/"
}
],
"first_seen": null,
"id": "relationship--7351f186-991d-42aa-a426-d839178d4124",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--f7e7b736-2cff-4c2a-9232-352cd383463a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-08T16:29:55.322Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--d76d838b-bbc7-459a-884a-2da8c36a2ba2",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-08T16:29:55.322Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "revoked-by",
"revoked": false,
"source_ref": "attack-pattern--b332a960-3c04-495a-827f-f17a5daed3a6",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-23T13:36:08.441Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Rotexy](https://attack.mitre.org/software/S0411) retrieves a list of installed applications and sends it to the command and control server.(Citation: securelist rotexy 2018)",
"external_references": [
{
"description": "T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan – banker and ransomware. Retrieved September 23, 2019.",
"external_id": null,
"source_name": "securelist rotexy 2018",
"url": "https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/"
}
],
"first_seen": null,
"id": "relationship--8ec03f4c-5ed8-4c25-956c-3ee6c777a5cc",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--0626c181-93cb-4860-9cb0-dff3b1c13063",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-07-10T15:18:16.753Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth.",
"external_references": [
{
"description": null,
"external_id": "T1507",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1507"
}
],
"first_seen": null,
"id": "attack-pattern--e4c347e9-fb91-4bc5-83b8-391e389131e2",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "collection"
}
],
"last_seen": null,
"modified": "2022-03-31T16:33:55.068Z",
"name": "Network Information Discovery",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": true,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-11T20:05:56.540Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--39b854c1-5906-4d14-a0bc-1242c3eaa5b0",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-11T20:05:56.540Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "subtechnique-of",
"revoked": false,
"source_ref": "attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--fc53309d-ebd5-4573-9242-57024ebdad4f",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:33.158Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may communicate using application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the mobile device, and often the results of those commands, will be embedded within the protocol traffic between the mobile device and server. \n\nAdversaries may utilize many different protocols, including those used for web browsing, transferring files, electronic mail, or DNS.",
"external_references": [
{
"description": null,
"external_id": "T1437",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1437"
},
{
"description": null,
"external_id": "APP-29",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-29.html"
}
],
"first_seen": null,
"id": "attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "command-and-control"
}
],
"last_seen": null,
"modified": "2022-04-19T20:03:51.831Z",
"name": "Application Layer Protocol",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.2"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-04T18:31:30.237Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Sunbird](https://attack.mitre.org/software/S1082) can access images stored on external storage.(Citation: lookout_hornbill_sunbird_0221)",
"external_references": [
{
"description": "Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023.",
"external_id": null,
"source_name": "lookout_hornbill_sunbird_0221",
"url": "https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict"
}
],
"first_seen": null,
"id": "relationship--503ca6f2-a747-43fb-8fc5-7be095dcb966",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-04T18:31:30.237Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--feae299d-e34f-4fc9-8545-486d0905bd41",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-10T17:08:35.846Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[CarbonSteal](https://attack.mitre.org/software/S0529) has used specially crafted SMS messages to control the target device.(Citation: Lookout Uyghur Campaign) ",
"external_references": [
{
"description": "A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020.",
"external_id": null,
"source_name": "Lookout Uyghur Campaign",
"url": "https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf"
}
],
"first_seen": null,
"id": "relationship--e33106e1-16ef-41b8-8d47-78c9f2b4dceb",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-19T14:25:41.669Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--007ebf84-4e14-44c7-a5aa-151d5de85320",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T17:54:56.603Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--e8768455-4d0c-4e3c-a901-1fc871227745",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-30T17:54:56.603Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "revoked-by",
"revoked": false,
"source_ref": "attack-pattern--786f488c-cb1f-4602-89c5-86d982ee326b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.733Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--d98a030f-c551-4fd0-9948-32e1ea01f79c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-10-20T15:05:19.274Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Data transmitted across a network (ex: Web, DNS, Mail, File, etc.), that is either summarized (ex: Netflow) and/or captured as raw data in an analyzable format (ex: PCAP)",
"external_references": [
{
"description": null,
"external_id": "DS0029",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/datasources/DS0029"
}
],
"first_seen": null,
"id": "x-mitre-data-source--c000cd5c-bbb3-4606-af6f-6c6d9de0bbe3",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-20T18:38:13.356Z",
"name": "Network Traffic",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "x-mitre-data-source",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": [
"Cloud Control Plane",
"Host",
"Network"
],
"x_mitre_contents": null,
"x_mitre_contributors": [
"Center for Threat-Informed Defense (CTID)",
"ExtraHop"
],
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"enterprise-attack",
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"IaaS",
"Linux",
"Windows",
"macOS",
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:51:40.217Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting may be able to identify applications that perform [Discovery](https://attack.mitre.org/tactics/TA0032) or utilize existing connectivity to remotely access hosts within an internal enterprise network. ",
"external_references": null,
"first_seen": null,
"id": "relationship--9e95ef68-0650-49eb-888f-47c211481be9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-09T17:16:36.672Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T15:04:14.532Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may use a device’s geographical location to limit certain malicious behaviors. For example, malware operators may limit the distribution of a second stage payload to certain geographic regions.(Citation: Lookout eSurv)\n\n[Geofencing](https://attack.mitre.org/techniques/T1581) is accomplished by persuading the user to grant the application permission to access location services. The application can then collect, process, and exfiltrate the device’s location to perform location-based actions, such as ceasing malicious behavior or showing region-specific advertisements.\n\nOne method to accomplish [Geofencing](https://attack.mitre.org/techniques/T1581) on Android is to use the built-in Geofencing API to automatically trigger certain behaviors when the device enters or exits a specified radius around a geographical location. Similar to other [Geofencing](https://attack.mitre.org/techniques/T1581) methods, this requires that the user has granted the `ACCESS_FINE_LOCATION` and `ACCESS_BACKGROUND_LOCATION` permissions. The latter is only required if the application targets Android 10 (API level 29) or higher. However, Android 11 introduced additional permission controls that may restrict background location collection based on user permission choices at runtime. These additional controls include “Allow only while using the app”, which will effectively prohibit background location collection.(Citation: Android Geofencing API)\n\nSimilarly, on iOS, developers can use built-in APIs to setup and execute geofencing. Depending on the use case, the app will either need to call `requestWhenInUseAuthorization()` or `requestAlwaysAuthorization()`, depending on when access to the location services is required. Similar to Android, users also have the option to limit when the application can access the device’s location, including one-time use and only when the application is running in the foreground.(Citation: Apple Location Services)\n\n[Geofencing](https://attack.mitre.org/techniques/T1581) can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. For example, location data could be used to limit malware spread and/or capabilities, which could also potentially evade application analysis environments (ex: malware analysis outside of the target geographic area). Other malicious usages could include showing language-specific [Input Prompt](https://attack.mitre.org/techniques/T1411)s and/or advertisements.",
"external_references": [
{
"description": null,
"external_id": "T1581",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1581"
},
{
"description": "A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "Lookout eSurv",
"url": "https://blog.lookout.com/esurv-research"
},
{
"description": "Apple. (n.d.). Requesting Authorization for Location Services. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "Apple Location Services",
"url": "https://developer.apple.com/documentation/corelocation/requesting_authorization_for_location_services"
},
{
"description": "Google. (n.d.). Create and monitor geofences. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "Android Geofencing API",
"url": "https://developer.android.com/training/location/geofencing"
}
],
"first_seen": null,
"id": "attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "defense-evasion"
}
],
"last_seen": null,
"modified": "2022-03-30T20:43:31.244Z",
"name": "Geofencing",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": true,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Users can review which applications have location permissions in the operating system’s settings menu. On Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T19:12:31.481Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--5de0caa8-81f8-453c-b70c-a74e7ea9e5c2",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-30T19:12:31.481Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "subtechnique-of",
"revoked": false,
"source_ref": "attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b7c0e45f-0206-4f75-96e7-fe7edad3aaff",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-18T19:46:02.547Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--cea30219-a255-43ae-b731-9512c5044523",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-18T19:46:02.547Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "revoked-by",
"revoked": false,
"source_ref": "attack-pattern--b3c2e5de-0941-4b57-ba61-af029eb5517a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-05-04T14:04:56.189Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Bread](https://attack.mitre.org/software/S0432) collects the device’s IMEI, carrier, mobile country code, and mobile network code.(Citation: Google Bread)",
"external_references": [
{
"description": "A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020.",
"external_id": null,
"source_name": "Google Bread",
"url": "https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html"
}
],
"first_seen": null,
"id": "relationship--86e3c37c-1e4a-450c-850b-c80be8156fe3",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-05-04T15:40:21.081Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--108b2817-bc01-404e-8e1b-8cdeec846326",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-09-20T13:42:21.096Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services could provide further scrutiny to applications that request permissions related to phone calls.",
"external_references": null,
"first_seen": null,
"id": "relationship--7e030fba-c123-4515-bc4f-482ea0947e2c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.736Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android, accessing the device call log requires that the app hold the READ_CALL_LOG permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate.",
"external_references": null,
"first_seen": null,
"id": "relationship--69d6f3fc-17ea-4a32-b4dd-a006c75362d6",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.745Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting may be able to identify the presence of exploit code within applications.",
"external_references": null,
"first_seen": null,
"id": "relationship--5f6f5913-cade-4b14-aa96-5a921b0927a7",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[NotCompatible](https://attack.mitre.org/software/S0299) has the capability to exploit systems on an enterprise network.(Citation: Lookout-NotCompatible)",
"external_references": [
{
"description": "Tim Strazzere. (2014, November 19). The new NotCompatible: Sophisticated and evasive threat harbors the potential to compromise enterprise networks. Retrieved December 22, 2016.",
"external_id": null,
"source_name": "Lookout-NotCompatible",
"url": "https://blog.lookout.com/blog/2014/11/19/notcompatible/"
}
],
"first_seen": null,
"id": "relationship--ffc24804-42db-4be1-a418-7f5ab9de453c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--23040c15-e7d8-47b5-8c16-8fd3e0e297fe",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:47.363Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AndroRAT](https://attack.mitre.org/software/S0292) is malware that allows a third party to control the device and collect information. (Citation: Lookout-EnterpriseApps)",
"external_references": [
{
"description": null,
"external_id": "S0292",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S0292"
},
{
"description": "(Citation: Lookout-EnterpriseApps)",
"external_id": null,
"source_name": "AndroRAT",
"url": null
},
{
"description": "Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016.",
"external_id": null,
"source_name": "Lookout-EnterpriseApps",
"url": "https://blog.lookout.com/blog/2016/05/25/spoofed-apps/"
}
],
"first_seen": null,
"id": "malware--a3dad2be-ce62-4440-953b-00fbce7aba93",
"identity_class": null,
"is_family": true,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-10-24T15:09:07.609Z",
"name": "AndroRAT",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": null,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "malware",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-06T13:52:46.831Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Android 7 changed how the Device Administrator password APIs function.",
"external_references": null,
"first_seen": null,
"id": "relationship--79c3fe5d-585b-401a-8bb4-84bfdc7252a1",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-06T13:52:46.831Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-27T16:55:40.101Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Bouncing Golf](https://attack.mitre.org/groups/G0097) distributed malware as repackaged legitimate applications, with the malicious code in the `com.golf` package.(Citation: Trend Micro Bouncing Golf 2019)",
"external_references": [
{
"description": "E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020.",
"external_id": null,
"source_name": "Trend Micro Bouncing Golf 2019",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/"
}
],
"first_seen": null,
"id": "relationship--cedf4ccb-7fbb-45bb-aab4-a5ae676d9f48",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "intrusion-set--049cef3b-22d5-4be6-b50c-9839c7a34fdd",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Pegasus was delivered via an SMS message containing a link to a web site with malicious code.",
"external_references": [
{
"description": "Bill Marczak and John Scott-Railton. (2016, August 24). The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved December 12, 2016.",
"external_id": null,
"source_name": "PegasusCitizenLab",
"url": "https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"
}
],
"first_seen": null,
"id": "relationship--9e77b80d-4981-4908-9203-c4e7cea5b5d8",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2018-10-23T00:14:20.652Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--33d9d91d-aad9-49d5-a516-220ce101ac8a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:32.328Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may attempt to make a payload or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the device or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \n \nPayloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Portions of files can also be encoded to hide the plaintext strings that would otherwise help defenders with discovery. Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled.(Citation: Microsoft MalLockerB) ",
"external_references": [
{
"description": null,
"external_id": "T1406",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1406"
},
{
"description": "D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020.",
"external_id": null,
"source_name": "Microsoft MalLockerB",
"url": "https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/"
},
{
"description": null,
"external_id": "APP-21",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.html"
}
],
"first_seen": null,
"id": "attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "defense-evasion"
}
],
"last_seen": null,
"modified": "2023-08-09T14:38:34.859Z",
"name": "Obfuscated Files or Information",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "3.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T19:36:09.691Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may wipe a device or delete individual files in order to manipulate external outcomes or hide activity. An application must have administrator access to fully wipe the device, while individual files may not require special permissions to delete depending on their storage location.(Citation: Android DevicePolicyManager 2019) \n\nStored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The impact file deletion will have depends on the type of data as well as the goals and objectives of the adversary, but can include deleting update files to evade detection or deleting attacker-specified files for impact.",
"external_references": [
{
"description": null,
"external_id": "T1630.002",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1630/002"
},
{
"description": "Android Developers. (n.d.). DevicePolicyManager. Retrieved September 22, 2019.",
"external_id": null,
"source_name": "Android DevicePolicyManager 2019",
"url": "https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html"
}
],
"first_seen": null,
"id": "attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "defense-evasion"
}
],
"last_seen": null,
"modified": "2023-03-20T18:52:24.758Z",
"name": "File Deletion",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Mobile security products can detect which applications can request device administrator permissions. Users can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. Application vetting services could be extra scrutinous of applications that request device administrator permissions.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": true,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Skygofree](https://attack.mitre.org/software/S0327) can be controlled via binary SMS.(Citation: Kaspersky-Skygofree)",
"external_references": [
{
"description": "Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018.",
"external_id": null,
"source_name": "Kaspersky-Skygofree",
"url": "https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/"
}
],
"first_seen": null,
"id": "relationship--bc0d2cbb-30fa-40e6-a250-bf6e5d8f9005",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-19T14:25:41.669Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--3a913bac-4fae-4d0e-bca8-cae452f1599b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-06T13:39:39.779Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity. By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, or decision making.\n\nManipulation may be possible over a network connection or between system processes where there is an opportunity to deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system, typically gained through a prolonged information gathering campaign, in order to have the desired impact.\n\nOne method to achieve [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) is by modifying the contents of the device clipboard. Malicious applications may monitor clipboard activity through the `ClipboardManager.OnPrimaryClipChangedListener` interface on Android to determine when clipboard contents have changed. Listening to clipboard activity, reading clipboard contents, and modifying clipboard contents requires no explicit application permissions and can be performed by applications running in the background. However, this behavior has changed with the release of Android 10.\n\nAdversaries may use [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) to replace text prior to being pasted. For example, replacing a copied Bitcoin wallet address with a wallet address that is under adversarial control.\n\n[Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) was seen within the Android/Clipper.C trojan. This sample was detected by ESET in an application distributed through the Google Play Store targeting cryptocurrency wallet numbers.(Citation: ESET Clipboard Modification February 2019)",
"external_references": [
{
"description": null,
"external_id": "T1641.001",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1641/001"
},
{
"description": "ESET. (2019, February 11). First clipper malware discovered on Google Play.. Retrieved July 26, 2019.",
"external_id": null,
"source_name": "ESET Clipboard Modification February 2019",
"url": "https://www.eset.com/uk/about/newsroom/press-releases/first-clipper-malware-discovered-on-google-play-1/"
}
],
"first_seen": null,
"id": "attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "impact"
}
],
"last_seen": null,
"modified": "2023-03-20T18:44:26.748Z",
"name": "Transmitted Data Manipulation",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Applications could be vetted for their use of the clipboard manager APIs with extra scrutiny given to application that make use of them.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": true,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T18:50:50.273Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AbstractEmu](https://attack.mitre.org/software/S1061) can use rooting exploits to silently give itself permissions or install additional malware.(Citation: lookout_abstractemu_1021)",
"external_references": [
{
"description": "P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023.",
"external_id": null,
"source_name": "lookout_abstractemu_1021",
"url": "https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign"
}
],
"first_seen": null,
"id": "relationship--25655385-5b0d-4700-a59f-d5d043625b84",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-03-27T17:13:16.813Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--2aec175b-4429-4048-8e09-3ef6cbecfc64",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.735Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Starting with Android 4.2 the user must provide consent before applications can send SMS messages to premium numbers.(Citation: AndroidSecurity2014)",
"external_references": [
{
"description": "Google. (2014). Android Security 2014 Year in Review. Retrieved December 12, 2016.",
"external_id": null,
"source_name": "AndroidSecurity2014",
"url": "https://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2014_Report_Final.pdf"
}
],
"first_seen": null,
"id": "relationship--d6930d98-f8a2-4556-baa4-95275d3fa23d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-07-21T19:36:09.214Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[BOULDSPY](https://attack.mitre.org/software/S1079) can take photos using the device cameras.(Citation: lookout_bouldspy_0423)",
"external_references": [
{
"description": "Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023.",
"external_id": null,
"source_name": "lookout_bouldspy_0423",
"url": "https://www.lookout.com/blog/iranian-spyware-bouldspy"
}
],
"first_seen": null,
"id": "relationship--c186864b-0af9-42eb-92ba-b8a6952e89b6",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-07-21T19:36:09.214Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Pegasus for iOS](https://attack.mitre.org/software/S0289) has the ability to record audio.(Citation: Lookout-Pegasus)",
"external_references": [
{
"description": "Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016.",
"external_id": null,
"source_name": "Lookout-Pegasus",
"url": "https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"
}
],
"first_seen": null,
"id": "relationship--b7652f27-1cf6-4310-bf6b-5fb99c4fd725",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--33d9d91d-aad9-49d5-a516-220ce101ac8a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-20T13:49:03.672Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[XLoader for Android](https://attack.mitre.org/software/S0318) has been distributed via phishing websites.(Citation: TrendMicro-XLoader-FakeSpy)",
"external_references": [
{
"description": "Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020.",
"external_id": null,
"source_name": "TrendMicro-XLoader-FakeSpy",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/"
}
],
"first_seen": null,
"id": "relationship--9d087e80-c58e-45ed-bc5d-bc99e3e3e42e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-02-17T20:43:52.381Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FrozenCell](https://attack.mitre.org/software/S0577) has retrieved account information for other applications.(Citation: Lookout FrozenCell)",
"external_references": [
{
"description": "Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020.",
"external_id": null,
"source_name": "Lookout FrozenCell",
"url": "https://blog.lookout.com/frozencell-mobile-threat"
}
],
"first_seen": null,
"id": "relationship--bce64ec2-43d5-4501-a0aa-0abe65551a19",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2021-02-17T20:43:52.381Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T15:02:43.475Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--3abcd7f4-5f6d-4b5d-9b37-eee68751dcbd",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-01T15:02:43.475Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "revoked-by",
"revoked": false,
"source_ref": "attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On iOS, the `allowEnterpriseAppTrust` and `allowEnterpriseAppTrustModification` configuration profile restrictions can be used to prevent users from installing apps signed using enterprise distribution keys.",
"external_references": null,
"first_seen": null,
"id": "relationship--ef977f9e-c505-449f-883a-915c1de1015f",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-03-11T15:13:40.454Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) uses encrypted content within a blog site for part of its command and control. Specifically, the encrypted content contains URLs for other servers to be used for other aspects of command and control.(Citation: TrendMicro-Anserver)",
"external_references": [
{
"description": "Karl Dominguez. (2011, October 2). Android Malware Uses Blog Posts as C&C. Retrieved February 6, 2017.",
"external_id": null,
"source_name": "TrendMicro-Anserver",
"url": "http://blog.trendmicro.com/trendlabs-security-intelligence/android-malware-uses-blog-posts-as-cc/"
}
],
"first_seen": null,
"id": "relationship--352fabc8-48fe-4190-92b3-49b00348bb22",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-18T19:04:48.388Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--4bf6ba32-4165-42c1-b911-9c36165891c8",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-20T13:58:53.610Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[XLoader for iOS](https://attack.mitre.org/software/S0490) can obtain the device’s UDID, version number, and product number.(Citation: TrendMicro-XLoader-FakeSpy)",
"external_references": [
{
"description": "Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020.",
"external_id": null,
"source_name": "TrendMicro-XLoader-FakeSpy",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/"
}
],
"first_seen": null,
"id": "relationship--3f392718-87c4-483b-b89f-4f0cc056d251",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-09-24T15:12:24.302Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--29944858-da52-4d3d-b428-f8a6eb8dde6f",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-07-21T19:53:12.605Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Fakecalls](https://attack.mitre.org/software/S1080) can access text message history.(Citation: kaspersky_fakecalls_0422)",
"external_references": [
{
"description": "Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023.",
"external_id": null,
"source_name": "kaspersky_fakecalls_0422",
"url": "https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/"
}
],
"first_seen": null,
"id": "relationship--ada67532-039d-4b4f-93ab-82ceba13ec56",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-07-21T19:53:12.605Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--429e1526-6293-495b-8808-af7f9a66c4be",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--c6421411-ae61-42bb-9098-73fddb315002",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T19:49:06.417Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features.",
"external_references": null,
"first_seen": null,
"id": "relationship--f051c943-998c-4db2-9dbc-d4755057bcf0",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-05T19:49:06.417Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-24T17:55:12.883Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GPlayed](https://attack.mitre.org/software/S0536) can lock the user out of the device by showing a persistent overlay.(Citation: Talos GPlayed)",
"external_references": [
{
"description": "V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020.",
"external_id": null,
"source_name": "Talos GPlayed",
"url": "https://blog.talosintelligence.com/2018/10/gplayedtrojan.html"
}
],
"first_seen": null,
"id": "relationship--5e95ca90-bf75-4031-a28f-f8565c02185c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:23:49.569Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--a993495c-9813-4372-b9ec-d168c7f7ec0a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-02T14:32:31.875Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[INSOMNIA](https://attack.mitre.org/software/S0463) can collect the device’s name, serial number, iOS version, total disk space, and free disk space.(Citation: Google Project Zero Insomnia) ",
"external_references": [
{
"description": "I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020.",
"external_id": null,
"source_name": "Google Project Zero Insomnia",
"url": "https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html"
}
],
"first_seen": null,
"id": "relationship--0993769f-63fb-4720-bbcf-e6f37f71515e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-06-02T14:32:31.875Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T14:43:46.034Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--9398bf9d-be77-4ac2-acea-893152cafd16",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-30T14:43:46.034Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "revoked-by",
"revoked": false,
"source_ref": "attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-07-21T19:52:13.807Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Fakecalls](https://attack.mitre.org/software/S1080) can turn on a device’s microphone to capture audio.(Citation: kaspersky_fakecalls_0422)",
"external_references": [
{
"description": "Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023.",
"external_id": null,
"source_name": "kaspersky_fakecalls_0422",
"url": "https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/"
}
],
"first_seen": null,
"id": "relationship--642a2599-a50c-480c-8e07-2a3a217f4a46",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-07-21T19:52:13.807Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--429e1526-6293-495b-8808-af7f9a66c4be",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-24T17:55:12.561Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GPlayed](https://attack.mitre.org/software/S0536) is an Android trojan with a broad range of capabilities.(Citation: Talos GPlayed) ",
"external_references": [
{
"description": null,
"external_id": "S0536",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S0536"
},
{
"description": "V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020.",
"external_id": null,
"source_name": "Talos GPlayed",
"url": "https://blog.talosintelligence.com/2018/10/gplayedtrojan.html"
}
],
"first_seen": null,
"id": "malware--a993495c-9813-4372-b9ec-d168c7f7ec0a",
"identity_class": null,
"is_family": true,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-11-24T17:55:12.561Z",
"name": "GPlayed",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": null,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "malware",
"x_mitre_aliases": [
"GPlayed"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-01-19T18:08:14.716Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TianySpy](https://attack.mitre.org/software/S1056) has encrypted C2 details, email addresses, and passwords.(Citation: trendmicro_tianyspy_0122) ",
"external_references": [
{
"description": "Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023.",
"external_id": null,
"source_name": "trendmicro_tianyspy_0122",
"url": "https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html"
}
],
"first_seen": null,
"id": "relationship--38cb6365-40ba-47c6-a5e4-1a9be665f951",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-03-01T16:50:04.964Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-02T14:32:31.906Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[INSOMNIA](https://attack.mitre.org/software/S0463) has communicated with the C2 using HTTPS requests over ports 43111, 43223, and 43773.(Citation: Volexity Insomnia)",
"external_references": [
{
"description": "A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020.",
"external_id": null,
"source_name": "Volexity Insomnia",
"url": "https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/"
}
],
"first_seen": null,
"id": "relationship--81e1311e-4fe1-4177-ae12-1d50037c5e4f",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-20T16:40:05.898Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-01-05T20:16:20.488Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Tiktok Pro](https://attack.mitre.org/software/S0558) can launch a fake Facebook login page.(Citation: Zscaler TikTok Spyware)",
"external_references": [
{
"description": "S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021.",
"external_id": null,
"source_name": "Zscaler TikTok Spyware",
"url": "https://www.zscaler.com/blogs/security-research/tiktok-spyware"
}
],
"first_seen": null,
"id": "relationship--0efe4125-504f-4eea-b19f-a44c81ee31dd",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-12T10:01:44.682Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-02T14:32:31.767Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[INSOMNIA](https://attack.mitre.org/software/S0463) has utilized malicious JavaScript and iframes to exploit WebKit running on vulnerable iOS 12 devices.(Citation: Volexity Insomnia)",
"external_references": [
{
"description": "A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020.",
"external_id": null,
"source_name": "Volexity Insomnia",
"url": "https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/"
}
],
"first_seen": null,
"id": "relationship--fc816ddc-199d-47b0-93af-c81305d0919f",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-06-02T14:32:31.767Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:11:37.252Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting techniques may be able to alert to the presence of obfuscated or encrypted code in applications, and such applications could have extra scrutiny applied. Unfortunately, this mitigation is likely impractical, as many legitimate applications apply code obfuscation or encryption to resist adversary techniques such as Repackaged Application. Dynamic analysis when used in application vetting may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code.",
"external_references": null,
"first_seen": null,
"id": "relationship--bd41c8b6-b587-4531-b015-55fdb357cb25",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-20T13:27:33.443Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[WolfRAT](https://attack.mitre.org/software/S0489) can collect user account, photos, browser history, and arbitrary files.(Citation: Talos-WolfRAT)",
"external_references": [
{
"description": "W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020.",
"external_id": null,
"source_name": "Talos-WolfRAT",
"url": "https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html"
}
],
"first_seen": null,
"id": "relationship--6ce36374-2ff6-4b41-8493-148416153232",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-08-10T21:57:54.526Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--dfdac962-9461-47f0-a212-36dfce2a97e6",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T20:08:00.717Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": " [Gustuff](https://attack.mitre.org/software/S0406) can use SMS for command and control from a defined admin phone number.(Citation: Talos Gustuff Apr 2019) ",
"external_references": [
{
"description": "Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019.",
"external_id": null,
"source_name": "Talos Gustuff Apr 2019",
"url": "https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html"
}
],
"first_seen": null,
"id": "relationship--96569099-db95-4f3c-8ded-6d9cf023e55e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-19T14:25:41.669Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T20:08:00.701Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Gustuff](https://attack.mitre.org/software/S0406) was distributed via SMS phishing messages to numbers exfiltrated from compromised devices’ contact lists. The phishing SMS messages are sent from the compromised device to the target device.(Citation: Talos Gustuff Apr 2019)",
"external_references": [
{
"description": "Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019.",
"external_id": null,
"source_name": "Talos Gustuff Apr 2019",
"url": "https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html"
}
],
"first_seen": null,
"id": "relationship--cfda3abb-4372-4dbf-ace3-b8d5a0a6ad60",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-28T17:26:10.893Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Fakecalls](https://attack.mitre.org/software/S1080) can manipulate a device’s call log, including deleting incoming calls.(Citation: kaspersky_fakecalls_0422)",
"external_references": [
{
"description": "Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023.",
"external_id": null,
"source_name": "kaspersky_fakecalls_0422",
"url": "https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/"
}
],
"first_seen": null,
"id": "relationship--b81f9698-b9d1-4a6a-b836-f7e29232693a",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-28T17:26:10.893Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--429e1526-6293-495b-8808-af7f9a66c4be",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.2.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T17:53:35.582Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behavior after checking for the presence of artifacts indicative of a virtual environment or sandbox. If the adversary detects a virtual environment, they may alter their malware’s behavior to disengage from the victim or conceal the core functions of the implant. They may also search for virtualization artifacts before dropping secondary or additional payloads. \n\nChecks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. \n\nHardware checks, such as the presence of motion sensors, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices. ",
"external_references": [
{
"description": null,
"external_id": "T1633.001",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1633/001"
}
],
"first_seen": null,
"id": "attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "defense-evasion"
}
],
"last_seen": null,
"modified": "2023-03-20T18:51:04.432Z",
"name": "System Checks",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Application vetting services could look for applications attempting to get `android.os.SystemProperties` or `getprop` with the runtime `exec()` commands. This could indicate some level of sandbox evasion, as Google recommends against using system properties within applications.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": true,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SpyDealer](https://attack.mitre.org/software/S0324) can record phone calls and surrounding audio.(Citation: PaloAlto-SpyDealer)",
"external_references": [
{
"description": "Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018.",
"external_id": null,
"source_name": "PaloAlto-SpyDealer",
"url": "https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/"
}
],
"first_seen": null,
"id": "relationship--f6770c26-ae93-468d-acaa-ab4ffea0e047",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[RuMMS](https://attack.mitre.org/software/S0313) uses HTTP for command and control.(Citation: FireEye-RuMMS)",
"external_references": [
{
"description": "Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017.",
"external_id": null,
"source_name": "FireEye-RuMMS",
"url": "https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html"
}
],
"first_seen": null,
"id": "relationship--4d7e937d-7ea1-49cb-939c-5244815e51d7",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:03:03.296Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--936be60d-90eb-4c36-9247-4b31128432c4",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": [
"Confucius",
"Confucius APT"
],
"created": "2021-12-26T23:11:39.442Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Confucius](https://attack.mitre.org/groups/G0142) is a cyber espionage group that has primarily targeted military personnel, high-profile personalities, business persons, and government organizations in South Asia since at least 2013. Security researchers have noted similarities between [Confucius](https://attack.mitre.org/groups/G0142) and [Patchwork](https://attack.mitre.org/groups/G0040), particularly in their respective custom malware code and targets.(Citation: TrendMicro Confucius APT Feb 2018)(Citation: TrendMicro Confucius APT Aug 2021)(Citation: Uptycs Confucius APT Jan 2021)",
"external_references": [
{
"description": null,
"external_id": "G0142",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/groups/G0142"
},
{
"description": "Lunghi, D and Horejsi, J. (2018, February 13). Deciphering Confucius: A Look at the Group's Cyberespionage Operations. Retrieved December 26, 2021.",
"external_id": null,
"source_name": "TrendMicro Confucius APT Feb 2018",
"url": "https://www.trendmicro.com/en_us/research/18/b/deciphering-confucius-cyberespionage-operations.html"
},
{
"description": "Lunghi, D. (2021, August 17). Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military. Retrieved December 26, 2021.",
"external_id": null,
"source_name": "TrendMicro Confucius APT Aug 2021",
"url": "https://www.trendmicro.com/en_us/research/21/h/confucius-uses-pegasus-spyware-related-lures-to-target-pakistani.html"
},
{
"description": "Uptycs Threat Research Team. (2021, January 12). Confucius APT deploys Warzone RAT. Retrieved December 17, 2021.",
"external_id": null,
"source_name": "Uptycs Confucius APT Jan 2021",
"url": "https://www.uptycs.com/blog/confucius-apt-deploys-warzone-rat"
}
],
"first_seen": null,
"id": "intrusion-set--6eded342-33e5-4451-b6b2-e1c62863129f",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-22T20:43:16.504Z",
"name": "Confucius",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "intrusion-set",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"enterprise-attack",
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:50:32.580Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services could look for usage of the `READ_PRIVILEGED_PHONE_STATE` Android permission. This could indicate that non-system apps are attempting to access information that they do not have access to.",
"external_references": null,
"first_seen": null,
"id": "relationship--9caf7cd5-fa15-45f0-8e1e-75917ea33af2",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-09T16:45:40.815Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-10-01T14:42:49.171Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[BusyGasper](https://attack.mitre.org/software/S0655) can be controlled via IRC using freenode.net servers.(Citation: SecureList BusyGasper)",
"external_references": [
{
"description": "Alexey Firsh. (2018, August 29). BusyGasper – the unfriendly spy. Retrieved October 1, 2021.",
"external_id": null,
"source_name": "SecureList BusyGasper",
"url": "https://securelist.com/busygasper-the-unfriendly-spy/87627/"
}
],
"first_seen": null,
"id": "relationship--119b848b-84b4-4f86-a265-0c9eb8680072",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-18T19:01:58.546Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-04T15:38:56.883Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FlexiSpy](https://attack.mitre.org/software/S0408) can collect the device calendars.(Citation: CyberMerchants-FlexiSpy)",
"external_references": [
{
"description": "Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019.",
"external_id": null,
"source_name": "CyberMerchants-FlexiSpy",
"url": "http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html"
}
],
"first_seen": null,
"id": "relationship--4af26643-880f-4c34-a4a8-23e89b950c9d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:18:38.582Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
Subsets and Splits