type
stringclasses 1
value | id
stringclasses 1
value | spec_version
float64 2.1
2.1
| objects
dict |
---|---|---|---|
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.743Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--2f5da3a1-19da-421f-be48-cfdcd3c79be1",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2018-10-23T00:14:20.652Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T19:21:23.143Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has registered to receive the `BOOT_COMPLETED` broadcast intent to activate on device startup.(Citation: WeLiveSecurity AdDisplayAshas)",
"external_references": [
{
"description": "L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020.",
"external_id": null,
"source_name": "WeLiveSecurity AdDisplayAshas",
"url": "https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/"
}
],
"first_seen": null,
"id": "relationship--a503ca06-7f98-4ab4-a8fc-ff55c3da7f0a",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:48:18.023Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--f7e7b736-2cff-4c2a-9232-352cd383463a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T12:50:48.459Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--a111ab3c-97f2-4b17-b291-f141e9b7613f",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-01T12:50:48.459Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "revoked-by",
"revoked": false,
"source_ref": "attack-pattern--62adb627-f647-498e-b4cc-41499361bacb",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T15:14:33.730Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may delete, alter, or send SMS messages without user authorization. This could be used to hide C2 SMS messages, spread malware, or various external effects.\n\nThis can be accomplished by requesting the `RECEIVE_SMS` or `SEND_SMS` permissions depending on what the malware is attempting to do. If the app is set as the default SMS handler on the device, the `SMS_DELIVER` broadcast intent can be registered, which allows the app to write to the SMS content provider. The content provider directly modifies the messaging database on the device, which could allow malicious applications with this ability to insert, modify, or delete arbitrary messages on the device.(Citation: SMS KitKat)(Citation: Android SmsProvider)",
"external_references": [
{
"description": null,
"external_id": "T1582",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1582"
},
{
"description": "Google. (n.d.). SmsProvider.java. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "Android SmsProvider",
"url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/7e7c274/src/com/android/providers/telephony/SmsProvider.java"
},
{
"description": "S.Main, D. Braun. (2013, October 14). Getting Your SMS Apps Ready for KitKat. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "SMS KitKat",
"url": "https://android-developers.googleblog.com/2013/10/getting-your-sms-apps-ready-for-kitkat.html"
},
{
"description": null,
"external_id": "APP-16",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-16.html"
},
{
"description": null,
"external_id": "CEL-41",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-41.html"
}
],
"first_seen": null,
"id": "attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "impact"
}
],
"last_seen": null,
"modified": "2023-03-20T18:58:57.001Z",
"name": "SMS Control",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Users can view the default SMS handler in system settings.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:55:33.546Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it.",
"external_references": null,
"first_seen": null,
"id": "relationship--2b0f4c1d-8d99-4e80-8555-d9a454d5cab7",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-09T16:44:31.916Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-31T18:25:05.162Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[CHEMISTGAMES](https://attack.mitre.org/software/S0555) can run bash commands.(Citation: CYBERWARCON CHEMISTGAMES)",
"external_references": [
{
"description": "B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020.",
"external_id": null,
"source_name": "CYBERWARCON CHEMISTGAMES",
"url": "https://www.youtube.com/watch?v=xoNSbm1aX_w"
}
],
"first_seen": null,
"id": "relationship--4a936488-526c-40c1-b2d5-490052cb0e73",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T21:22:53.698Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--a0d774e4-bafc-4292-8651-3ec899391341",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-05-07T15:24:49.530Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Security updates frequently contain patches to vulnerabilities.",
"external_references": null,
"first_seen": null,
"id": "relationship--45253350-c802-4566-a72d-57d43d05fd63",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-05-27T13:23:34.536Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:11:37.266Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--ebbae7c2-fd79-4191-9369-e3b35283d4e1",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T18:13:26.003Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may modify code signing policies to enable execution of applications signed with unofficial or unknown keys. Code signing provides a level of authenticity on an app from a developer, guaranteeing that the program has not been tampered with and comes from an official source. Security controls can include enforcement mechanisms to ensure that only valid, signed code can be run on a device. \n\nMobile devices generally enable these security controls by default, such as preventing the installation of unknown applications on Android. Adversaries may modify these policies in a number of ways, including [Input Injection](https://attack.mitre.org/techniques/T1516) or malicious configuration profiles.",
"external_references": [
{
"description": null,
"external_id": "T1632.001",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1632/001"
},
{
"description": null,
"external_id": "STA-7",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-7.html"
}
],
"first_seen": null,
"id": "attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "defense-evasion"
}
],
"last_seen": null,
"modified": "2023-03-16T18:37:55.822Z",
"name": "Code Signing Policy Modification",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications.\n\nOn iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": true,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-28T19:32:05.234Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application developers should be cautious when selecting third-party libraries to integrate into their application.",
"external_references": null,
"first_seen": null,
"id": "relationship--c90bfd4c-3c7e-4528-b5f6-574ef29ecdc9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-28T19:32:05.234Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--7827ced0-95e7-4d05-bdcf-0d8f2d37a3d3",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Skygofree](https://attack.mitre.org/software/S0327) can be controlled via HTTP, XMPP, FirebaseCloudMessaging, or GoogleCloudMessaging in older versions.(Citation: Kaspersky-Skygofree)",
"external_references": [
{
"description": "Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018.",
"external_id": null,
"source_name": "Kaspersky-Skygofree",
"url": "https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/"
}
],
"first_seen": null,
"id": "relationship--f62e0aaf-e52f-40b9-a059-001f298a0660",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:19:00.168Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--3a913bac-4fae-4d0e-bca8-cae452f1599b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.739Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Check for potential malicious definitions of URL schemes when vetting applications. Also, when examining apps for potential vulnerabilities, encourage use of universal links as an alternative to URL schemes. When examining apps that use OAuth, encourage use of best practices.",
"external_references": [
{
"description": "Apple. (n.d.). Support Universal Links. Retrieved December 21, 2016.",
"external_id": null,
"source_name": "Apple-UniversalLinks",
"url": "https://developer.apple.com/library/content/documentation/General/Conceptual/AppSearch/UniversalLinks.html"
},
{
"description": "W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018.",
"external_id": null,
"source_name": "IETF-OAuthNativeApps",
"url": "https://tools.ietf.org/html/rfc8252"
}
],
"first_seen": null,
"id": "relationship--3a446bee-007b-4b1f-849e-60e9d39c2e92",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--8f142a25-f6c3-4520-bd50-2ae3ab50ed3e",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-29T13:24:15.234Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Dendroid](https://attack.mitre.org/software/S0301) can open a dialog box to ask the user for passwords.(Citation: Lookout-Dendroid)",
"external_references": [
{
"description": "Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016.",
"external_id": null,
"source_name": "Lookout-Dendroid",
"url": "https://blog.lookout.com/blog/2014/03/06/dendroid/"
}
],
"first_seen": null,
"id": "relationship--455b1287-5784-42b4-91fb-01dac007758d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-12T10:01:44.682Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--317a2c10-d489-431e-b6b2-f0251fddc88e",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-24T21:45:56.965Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SilkBean](https://attack.mitre.org/software/S0549) can access device contacts.(Citation: Lookout Uyghur Campaign)",
"external_references": [
{
"description": "A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020.",
"external_id": null,
"source_name": "Lookout Uyghur Campaign",
"url": "https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf"
}
],
"first_seen": null,
"id": "relationship--049b0c71-63e3-47ce-bb0b-149df0344b15",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:15:59.861Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--ddbe5657-e21e-4a89-8221-2f1362d397ec",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T18:45:11.299Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Recent versions of Android modified how device administrator applications are uninstalled, making it easier for the user to remove them.",
"external_references": null,
"first_seen": null,
"id": "relationship--26b1025b-5c08-4b6e-8c50-7d2baf29e7b7",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-01T18:45:11.299Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-20T15:54:07.747Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Golden Cup](https://attack.mitre.org/software/S0535) can record audio from the microphone and phone calls.(Citation: Symantec GoldenCup) ",
"external_references": [
{
"description": "R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020.",
"external_id": null,
"source_name": "Symantec GoldenCup",
"url": "https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans"
}
],
"first_seen": null,
"id": "relationship--36298fd6-d909-4490-8a04-095aef9ffafe",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-11-20T15:54:07.747Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--f3975cc0-72bc-4308-836e-ac701b83860e",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-04T15:38:56.702Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FlexiSpy](https://attack.mitre.org/software/S0408) installs boot hooks into `/system/su.d`.(Citation: FortiGuard-FlexiSpy)",
"external_references": [
{
"description": "K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019.",
"external_id": null,
"source_name": "FortiGuard-FlexiSpy",
"url": "https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf"
}
],
"first_seen": null,
"id": "relationship--e135cefa-f019-479d-86eb-438972df73e0",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:48:30.652Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:05.928Z",
"created_by_ref": null,
"definition": null,
"definition_type": null,
"description": null,
"external_references": [
{
"description": null,
"external_id": "T1441",
"source_name": "mitre-mobile-attack",
"url": "https://attack.mitre.org/techniques/T1441"
}
],
"first_seen": null,
"id": "attack-pattern--a21a6a79-f9a1-4c87-aed9-ba2d79536881",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": "Stolen Developer Credentials or Signing Keys",
"object_marking_refs": null,
"relationship_type": null,
"revoked": true,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": null,
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-28T17:20:38.294Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Escobar](https://attack.mitre.org/software/S1092) can initiate phone calls.(Citation: Bleeipng Computer Escobar)",
"external_references": [
{
"description": "B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023.",
"external_id": null,
"source_name": "Bleeipng Computer Escobar",
"url": "https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/"
}
],
"first_seen": null,
"id": "relationship--3a282967-0536-474d-8831-30cd60b818a9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-28T17:20:38.294Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.2.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:51:04.334Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services could look for applications attempting to get `android.os.SystemProperties` or `getprop` with the runtime `exec()` commands. This could indicate some level of sandbox evasion, as Google recommends against using system properties within applications.",
"external_references": null,
"first_seen": null,
"id": "relationship--a5b37f26-7629-4195-9536-12e349e5843b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-09T14:54:47.199Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[ZergHelper](https://attack.mitre.org/software/S0287) attempts to extend its capabilities via dynamic updating of its code.(Citation: Xiao-ZergHelper)",
"external_references": [
{
"description": "Claud Xiao. (2016, February 21). Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016.",
"external_id": null,
"source_name": "Xiao-ZergHelper",
"url": "http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/"
}
],
"first_seen": null,
"id": "relationship--d54bdaff-8eb8-4a02-9f64-bc33c892e9d1",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-03T16:19:30.443Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[YiSpecter](https://attack.mitre.org/software/S0311) has hidden the app icon from iOS springboard.(Citation: paloalto_yispecter_1015)",
"external_references": [
{
"description": "Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023.",
"external_id": null,
"source_name": "paloalto_yispecter_1015",
"url": "https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/"
}
],
"first_seen": null,
"id": "relationship--ed48a86f-e55f-4abf-8f18-98591b756399",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-03-03T16:19:30.443Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--a15c9357-2be0-4836-beec-594f28b9b4a9",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Skygofree](https://attack.mitre.org/software/S0327) can record audio via the microphone when an infected device is in a specified location.(Citation: Kaspersky-Skygofree)",
"external_references": [
{
"description": "Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018.",
"external_id": null,
"source_name": "Kaspersky-Skygofree",
"url": "https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/"
}
],
"first_seen": null,
"id": "relationship--06348e22-9a06-4e4c-a57c-e438462e7fce",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--3a913bac-4fae-4d0e-bca8-cae452f1599b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-08T15:51:25.120Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Ginp](https://attack.mitre.org/software/S0423) obfuscates its payload, code, and strings.(Citation: ThreatFabric Ginp)",
"external_references": [
{
"description": "ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020.",
"external_id": null,
"source_name": "ThreatFabric Ginp",
"url": "https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html"
}
],
"first_seen": null,
"id": "relationship--f88cbb0c-ca34-4a87-82fa-e0e567ee8d57",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-04-08T15:51:25.120Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--6146be90-470c-4049-bb3a-9986b8ffb65b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-09-24T14:47:34.459Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services could look for attempts to invoke the superuser (su) binary or modules related to rooting frameworks.",
"external_references": null,
"first_seen": null,
"id": "relationship--c2f436e1-cdd7-4d5c-ae62-9aaa31e47b10",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ccde43e4-78f9-4f32-b401-c081e7db71ea",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-20T13:27:33.514Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[WolfRAT](https://attack.mitre.org/software/S0489) can delete files from the device.(Citation: Talos-WolfRAT)",
"external_references": [
{
"description": "W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020.",
"external_id": null,
"source_name": "Talos-WolfRAT",
"url": "https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html"
}
],
"first_seen": null,
"id": "relationship--2c5b36b4-5381-4d9e-9ce5-cd7cd19041b1",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:35:47.258Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--dfdac962-9461-47f0-a212-36dfce2a97e6",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Gooligan](https://attack.mitre.org/software/S0290) executes Android root exploits.(Citation: Gooligan Citation)",
"external_references": [
{
"description": "Check Point Research Team. (2016, November 30). More Than 1 Million Google Accounts Breached by Gooligan. Retrieved December 12, 2016.",
"external_id": null,
"source_name": "Gooligan Citation",
"url": "http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/"
}
],
"first_seen": null,
"id": "relationship--aa8e45c2-4276-451b-b1eb-59c396bf720a",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--20d56cd6-8dff-4871-9889-d32d254816de",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-27T17:05:58.213Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GolfSpy](https://attack.mitre.org/software/S0421) can obtain a list of installed applications.(Citation: Trend Micro Bouncing Golf 2019)",
"external_references": [
{
"description": "E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020.",
"external_id": null,
"source_name": "Trend Micro Bouncing Golf 2019",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/"
}
],
"first_seen": null,
"id": "relationship--a9689f2c-ad8f-4861-8cad-d78e07fd1530",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-01-27T17:05:58.213Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T19:45:48.515Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": " [Exodus](https://attack.mitre.org/software/S0405) Two attempts to elevate privileges by using a modified version of the DirtyCow exploit.(Citation: SWB Exodus March 2019) ",
"external_references": [
{
"description": "Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019.",
"external_id": null,
"source_name": "SWB Exodus March 2019",
"url": "https://securitywithoutborders.org/blog/2019/03/29/exodus.html"
}
],
"first_seen": null,
"id": "relationship--3bf5a566-986b-478c-b2da-e57caf261378",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-14T15:02:35.283Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Asacub](https://attack.mitre.org/software/S0540) has masqueraded as a client of popular free ads services.(Citation: Securelist Asacub)",
"external_references": [
{
"description": "T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020.",
"external_id": null,
"source_name": "Securelist Asacub",
"url": "https://securelist.com/the-rise-of-mobile-banker-asacub/87591/"
}
],
"first_seen": null,
"id": "relationship--282d2448-6fe8-4995-b17e-4ce7586f75b9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--a76b837b-93cc-417d-bf28-c47a6a284fa4",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-01-05T20:16:20.492Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Tiktok Pro](https://attack.mitre.org/software/S0558) has registered for device boot, incoming, and outgoing calls broadcast intents.(Citation: Zscaler TikTok Spyware)",
"external_references": [
{
"description": "S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021.",
"external_id": null,
"source_name": "Zscaler TikTok Spyware",
"url": "https://www.zscaler.com/blogs/security-research/tiktok-spyware"
}
],
"first_seen": null,
"id": "relationship--4d6a900d-d1c4-4a91-bded-c9062aae384b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:47:18.774Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T15:14:34.071Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services could provide further scrutiny to applications that request SMS-based permissions.",
"external_references": null,
"first_seen": null,
"id": "relationship--cdc1b090-1ca8-4fb3-a149-ca8c4e070250",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-04T15:38:56.881Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FlexiSpy](https://attack.mitre.org/software/S0408) can collect device contacts.(Citation: CyberMerchants-FlexiSpy)",
"external_references": [
{
"description": "Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019.",
"external_id": null,
"source_name": "CyberMerchants-FlexiSpy",
"url": "http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html"
}
],
"first_seen": null,
"id": "relationship--edfb68d0-5efd-4fb5-93f9-c432535686cb",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T19:56:00.761Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Below are the tactics and techniques representing the two MITRE ATT&CK Matrices for Mobile. The Matrices cover techniques involving device access and network-based effects that can be used by adversaries without device access. The Matrices contains information for the following platforms: Android, iOS.",
"external_references": [
{
"description": null,
"external_id": "mobile-attack",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/matrices/mobile-attack"
}
],
"first_seen": null,
"id": "x-mitre-matrix--5104d5f0-16b7-4aec-8ae3-0a90cd5494fc",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-06T15:44:04.736Z",
"name": "Network-Based Effects",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": [
"x-mitre-tactic--9eb4c21e-4fa8-44c9-b167-dbfc455f9210",
"x-mitre-tactic--e78d7d60-41b5-49b7-b0a9-5c5d4cbabe17"
],
"target_ref": null,
"type": "x-mitre-matrix",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:21.667Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An adversary could cause the mobile device to use less secure protocols, for example by jamming frequencies used by newer protocols such as LTE and only allowing older protocols such as GSM to communicate(Citation: NIST-SP800187). Use of less secure protocols may make communication easier to eavesdrop upon or manipulate.",
"external_references": [
{
"description": null,
"external_id": "T1466",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1466"
},
{
"description": "Jeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017.",
"external_id": null,
"source_name": "NIST-SP800187",
"url": "http://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf"
},
{
"description": null,
"external_id": "CEL-3",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html"
}
],
"first_seen": null,
"id": "attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "network-effects"
}
],
"last_seen": null,
"modified": "2022-04-06T15:50:42.480Z",
"name": "Downgrade to Insecure Protocols",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": true,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Without Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[ZergHelper](https://attack.mitre.org/software/S0287) apparently evaded Apple's app review process by performing different behaviors for users from different physical locations (e.g. performing differently for users in China versus outside of China), which could have bypassed the review process depending on the country from which it was performed.(Citation: Xiao-ZergHelper)",
"external_references": [
{
"description": "Claud Xiao. (2016, February 21). Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016.",
"external_id": null,
"source_name": "Xiao-ZergHelper",
"url": "http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/"
}
],
"first_seen": null,
"id": "relationship--f8277cd5-b14a-4b59-9f29-8ce24dfbdf5e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-14T15:02:35.007Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Asacub](https://attack.mitre.org/software/S0540) is a banking trojan that attempts to steal money from victims’ bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.(Citation: Securelist Asacub)",
"external_references": [
{
"description": null,
"external_id": "S0540",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S0540"
},
{
"description": "(Citation: Securelist Asacub)",
"external_id": null,
"source_name": "Trojan-SMS.AndroidOS.Smaps",
"url": null
},
{
"description": "T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020.",
"external_id": null,
"source_name": "Securelist Asacub",
"url": "https://securelist.com/the-rise-of-mobile-banker-asacub/87591/"
}
],
"first_seen": null,
"id": "malware--a76b837b-93cc-417d-bf28-c47a6a284fa4",
"identity_class": null,
"is_family": true,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-12-16T20:21:43.239Z",
"name": "Asacub",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": null,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "malware",
"x_mitre_aliases": [
"Asacub",
"Trojan-SMS.AndroidOS.Smaps"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-07-10T15:35:43.631Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Pallas](https://attack.mitre.org/software/S0399) queries the device for metadata, such as device ID, OS version, and the number of cameras.(Citation: Lookout Dark Caracal Jan 2018)",
"external_references": [
{
"description": "Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.",
"external_id": null,
"source_name": "Lookout Dark Caracal Jan 2018",
"url": "https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf"
}
],
"first_seen": null,
"id": "relationship--9366529d-fba9-4ef6-b4ee-b6b41aa3b18c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:12.267Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may track a device’s physical location through use of standard operating system APIs via malicious or exploited applications on the compromised device. \n\n \n\nOn Android, applications holding the `ACCESS_COAURSE_LOCATION` or `ACCESS_FINE_LOCATION` permissions provide access to the device’s physical location. On Android 10 and up, declaration of the `ACCESS_BACKGROUND_LOCATION` permission in an application’s manifest will allow applications to request location access even when the application is running in the background.(Citation: Android Request Location Permissions) Some adversaries have utilized integration of Baidu map services to retrieve geographical location once the location access permissions had been obtained.(Citation: PaloAlto-SpyDealer)(Citation: Palo Alto HenBox) \n\n \n\nOn iOS, applications must include the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file depending on the extent of requested access to location information.(Citation: Apple Requesting Authorization for Location Services) On iOS 8.0 and up, applications call `requestWhenInUseAuthorization()` to request access to location information when the application is in use or `requestAlwaysAuthorization()` to request access to location information regardless of whether the application is in use. With elevated privileges, an adversary may be able to access location data without explicit user consent with the `com.apple.locationd.preauthorized` entitlement key.(Citation: Google Project Zero Insomnia)",
"external_references": [
{
"description": null,
"external_id": "T1430",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1430"
},
{
"description": "A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019.",
"external_id": null,
"source_name": "Palo Alto HenBox",
"url": "https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/"
},
{
"description": "Android Developers. (2022, March 24). Request Location Permissions. Retrieved April 1, 2022.",
"external_id": null,
"source_name": "Android Request Location Permissions",
"url": "https://developer.android.com/training/location/permissions"
},
{
"description": "Apple Developers. (n.d.). Requesting Authorization for Location Services. Retrieved April 1, 2022.",
"external_id": null,
"source_name": "Apple Requesting Authorization for Location Services",
"url": "https://developer.apple.com/documentation/corelocation/requesting_authorization_for_location_services"
},
{
"description": "I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020.",
"external_id": null,
"source_name": "Google Project Zero Insomnia",
"url": "https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html"
},
{
"description": "Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018.",
"external_id": null,
"source_name": "PaloAlto-SpyDealer",
"url": "https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/"
},
{
"description": null,
"external_id": "APP-24",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.html"
}
],
"first_seen": null,
"id": "attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "collection"
},
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "discovery"
}
],
"last_seen": null,
"modified": "2023-03-20T18:50:21.363Z",
"name": "Location Tracking",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Android applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. \n\n \n\nIn both Android (6.0 and up) and iOS, users can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. ",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.2"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-05-04T14:04:56.158Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Bread](https://attack.mitre.org/software/S0432) can perform SMS fraud on older versions of the malware, and toll fraud on newer versions.(Citation: Google Bread)",
"external_references": [
{
"description": "A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020.",
"external_id": null,
"source_name": "Google Bread",
"url": "https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html"
}
],
"first_seen": null,
"id": "relationship--b7a31a11-6c84-4c28-a548-4751e4d71134",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-19T14:25:41.669Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--108b2817-bc01-404e-8e1b-8cdeec846326",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Judy](https://attack.mitre.org/software/S0325) is auto-clicking adware that was distributed through multiple apps in the Google Play Store. (Citation: CheckPoint-Judy)",
"external_references": [
{
"description": null,
"external_id": "S0325",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S0325"
},
{
"description": "(Citation: CheckPoint-Judy)",
"external_id": null,
"source_name": "Judy",
"url": null
},
{
"description": "CheckPoint. (2017, May 25). The Judy Malware: Possibly the largest malware campaign found on Google Play. Retrieved September 18, 2018.",
"external_id": null,
"source_name": "CheckPoint-Judy",
"url": "https://blog.checkpoint.com/2017/05/25/judy-malware-possibly-largest-malware-campaign-found-google-play/"
}
],
"first_seen": null,
"id": "malware--172444ab-97fc-4d94-b142-179452bfb760",
"identity_class": null,
"is_family": true,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-10-24T15:09:07.609Z",
"name": "Judy",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": null,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "malware",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.741Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android, accessing device calendar data requires that the app hold the READ_CALENDAR permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate. On iOS, the app vetting process can determine whether apps access device calendar data, with extra scrutiny applied to any that do so.",
"external_references": null,
"first_seen": null,
"id": "relationship--85328449-c231-444d-905a-2988c14d3e82",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--1553b156-6767-47f7-9eb4-2a692505666d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--62adb627-f647-498e-b4cc-41499361bacb",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T14:08:09.882Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--1987b242-c868-40b2-993d-9dbeea311d4b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-30T14:08:09.882Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "subtechnique-of",
"revoked": false,
"source_ref": "attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-26T15:32:25.060Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Cerberus](https://attack.mitre.org/software/S0480) can uninstall itself from a device on command.(Citation: Threat Fabric Cerberus)",
"external_references": [
{
"description": "Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020.",
"external_id": null,
"source_name": "Threat Fabric Cerberus",
"url": "https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html"
}
],
"first_seen": null,
"id": "relationship--e7b33eb5-6c2e-4743-ac8d-c27d5e7121ac",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T20:35:13.005Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-01-18T19:05:43.194Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Drinik](https://attack.mitre.org/software/S1054) is an evolving Android banking trojan that was observed targeting customers of around 27 banks in India in August 2021. Initially seen as an SMS stealer in 2016, [Drinik](https://attack.mitre.org/software/S1054) resurfaced as a banking trojan with more advanced capabilities included in subsequent versions between September 2021 and August 2022.(Citation: cyble_drinik_1022)",
"external_references": [
{
"description": null,
"external_id": "S1054",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S1054"
},
{
"description": "Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023.",
"external_id": null,
"source_name": "cyble_drinik_1022",
"url": "https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/"
}
],
"first_seen": null,
"id": "malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe",
"identity_class": null,
"is_family": true,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-13T22:33:34.237Z",
"name": "Drinik",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "malware",
"x_mitre_aliases": [
"Drinik"
],
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T15:32:36.972Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services can detect malicious code in applications.",
"external_references": null,
"first_seen": null,
"id": "relationship--626d4c6c-97e4-4aa3-922b-c1a81e677213",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-07T17:18:06.656Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:52:21.767Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.",
"external_references": null,
"first_seen": null,
"id": "relationship--148703c5-6d07-439c-a4ff-d77119c70857",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-14T16:23:41.266Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-14T14:52:02.949Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Red Alert 2.0](https://attack.mitre.org/software/S0539) is a banking trojan that masquerades as a VPN client.(Citation: Sophos Red Alert 2.0) ",
"external_references": [
{
"description": null,
"external_id": "S0539",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/software/S0539"
},
{
"description": "J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020.",
"external_id": null,
"source_name": "Sophos Red Alert 2.0",
"url": "https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/"
}
],
"first_seen": null,
"id": "malware--6e282bbf-5f32-476a-b879-ba77eec463c8",
"identity_class": null,
"is_family": true,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-12-16T20:52:20.822Z",
"name": "Red Alert 2.0",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": null,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "malware",
"x_mitre_aliases": [
"Red Alert 2.0"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-09-29T20:11:55.474Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "During [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016), the threat actors used Android backdoors capable of enumerating specific files on the infected devices.(Citation: Cylance Dust Storm)",
"external_references": [
{
"description": "Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.",
"external_id": null,
"source_name": "Cylance Dust Storm",
"url": "https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf"
}
],
"first_seen": null,
"id": "relationship--96ec33c8-78b6-421f-bab3-bd9d0564db31",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-09-30T18:39:16.003Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "campaign--4603cf2f-06d0-4970-9c5d-5071b08c817f",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.743Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--37c4a0cf-0552-46fd-b067-419b15833044",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SpyDealer](https://attack.mitre.org/software/S0324) harvests the device phone number, IMEI, and IMSI.(Citation: PaloAlto-SpyDealer)",
"external_references": [
{
"description": "Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018.",
"external_id": null,
"source_name": "PaloAlto-SpyDealer",
"url": "https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/"
}
],
"first_seen": null,
"id": "relationship--f6a451e8-2125-4bbe-be52-e682523cd169",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-25T19:54:37.211Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "When devices are enrolled in an EMM/MDM using device owner (iOS) or fully managed (Android) mode, the EMM/MDM can collect a list of installed applications on the device. An administrator can then act on, for example blocking, specific remote access applications from being installed on managed devices. ",
"external_references": null,
"first_seen": null,
"id": "relationship--c9769c36-d89b-40eb-92cb-8faa7d37a140",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-25T19:54:37.211Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-24T21:45:56.982Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SilkBean](https://attack.mitre.org/software/S0549) can get file lists on the SD card.(Citation: Lookout Uyghur Campaign)",
"external_references": [
{
"description": "A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020.",
"external_id": null,
"source_name": "Lookout Uyghur Campaign",
"url": "https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf"
}
],
"first_seen": null,
"id": "relationship--4586277d-bebd-4717-87c6-a31a9be741ed",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-12-24T21:45:56.982Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--ddbe5657-e21e-4a89-8221-2f1362d397ec",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:07.827Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an EMM console could use that access to wipe enrolled devices (Citation: Honan-Hacking).",
"external_references": [
{
"description": null,
"external_id": "T1469",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1469"
},
{
"description": "Mat Honan. (2012, August 6). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved December 29, 2016.",
"external_id": null,
"source_name": "Honan-Hacking",
"url": "https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/"
},
{
"description": null,
"external_id": "ECO-5",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html"
},
{
"description": null,
"external_id": "EMM-7",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html"
}
],
"first_seen": null,
"id": "attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "remote-service-effects"
}
],
"last_seen": null,
"modified": "2022-04-06T15:54:28.187Z",
"name": "Remotely Wipe Data Without Authorization",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": "Google provides the ability for users to view their general account activity. Apple iCloud also provides notifications to users of account activity.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Without Adversary Device Access"
],
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T16:22:03.296Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[ViperRAT](https://attack.mitre.org/software/S0506) can collect network configuration data from the device, including phone number, SIM operator, and network operator.(Citation: Lookout ViperRAT)",
"external_references": [
{
"description": "M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "Lookout ViperRAT",
"url": "https://blog.lookout.com/viperrat-mobile-apt"
}
],
"first_seen": null,
"id": "relationship--b6726136-3c20-4921-a0cb-75a66f59107c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-09-11T16:22:03.296Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--f666e17c-b290-43b3-8947-b96bd5148fbb",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.743Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--64a6fb42-65ce-4160-a5c8-ac176f60a2ae",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2018-10-23T00:14:20.652Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:52:52.011Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications.\n\nOn iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies.",
"external_references": null,
"first_seen": null,
"id": "relationship--9cfc30de-3e68-4361-a213-3c37ce27b70e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-09T14:51:29.206Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.735Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--6f8b3839-ea91-44d5-ba68-b9d1e6076c19",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--e829ee51-1caf-4665-ba15-7f8979634124",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--52651225-0b3a-482d-aa7e-10618fd063b5",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T19:28:25.541Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may delete, alter, or hide generated artifacts on a device, including files, jailbreak status, or the malicious application itself. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of mobile security solutions by causing notable events or information to go unreported.",
"external_references": [
{
"description": null,
"external_id": "T1630",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1630"
},
{
"description": null,
"external_id": "APP-43",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-43.html"
}
],
"first_seen": null,
"id": "attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "defense-evasion"
}
],
"last_seen": null,
"modified": "2023-03-20T18:42:18.121Z",
"name": "Indicator Removal on Host",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Mobile security products can detect which applications can request device administrator permissions. Users can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. Users can see a list of applications that can use accessibility services in the device settings. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"iOS",
"Android"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-05-07T15:33:32.778Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Agent Smith](https://attack.mitre.org/software/S0440) exploits known OS vulnerabilities, including Janus, to replace legitimate applications with malicious versions.(Citation: CheckPoint Agent Smith)",
"external_references": [
{
"description": "A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020.",
"external_id": null,
"source_name": "CheckPoint Agent Smith",
"url": "https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/"
}
],
"first_seen": null,
"id": "relationship--96490f73-d8ef-4c6b-9a3a-3c66fc963306",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-05-07T15:33:32.778Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--a6228601-03f6-4949-ae22-c1087627a637",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.736Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--b104c62f-771c-46c5-afc4-a964a94cea50",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2018-10-23T00:14:20.652Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Pegasus for iOS](https://attack.mitre.org/software/S0289) monitors the connection state and tracks which types of networks the phone is connected to, potentially to determine the bandwidth and ability to send full data across the network.(Citation: Lookout-Pegasus)",
"external_references": [
{
"description": "Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016.",
"external_id": null,
"source_name": "Lookout-Pegasus",
"url": "https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"
}
],
"first_seen": null,
"id": "relationship--450a1b75-efa5-4d7a-bcd5-d3e63723b408",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-15T19:47:48.036Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--33d9d91d-aad9-49d5-a516-220ce101ac8a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.746Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--49f0f7b8-7208-4650-89c2-5d6b1f166113",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2019-10-23T14:19:37.289Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T19:45:48.494Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": " [Exodus](https://attack.mitre.org/software/S0405) Two can take screenshots of any application in the foreground.(Citation: SWB Exodus March 2019) ",
"external_references": [
{
"description": "Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019.",
"external_id": null,
"source_name": "SWB Exodus March 2019",
"url": "https://securitywithoutborders.org/blog/2019/03/29/exodus.html"
}
],
"first_seen": null,
"id": "relationship--fb3b32a8-6422-4d44-91e3-27a58e569963",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T15:45:44.000Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Mobile security products can potentially detect jailbroken devices.",
"external_references": null,
"first_seen": null,
"id": "relationship--f390ee16-a7c8-4ef2-b6f4-28940a8f0d81",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-09T15:40:17.754Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-08T16:14:01.661Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services may potentially determine if an application contains suspicious code and/or metadata.",
"external_references": null,
"first_seen": null,
"id": "relationship--98fb2884-c912-42ff-9c87-4fbabfa70115",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-08T16:14:01.661Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "detects",
"revoked": false,
"source_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--f856eaab-e84a-4265-a8a2-7bf37e5dc2fc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Pegasus for Android](https://attack.mitre.org/software/S0316) accesses the list of installed applications.(Citation: Lookout-PegasusAndroid)",
"external_references": [
{
"description": "Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017.",
"external_id": null,
"source_name": "Lookout-PegasusAndroid",
"url": "https://blog.lookout.com/blog/2017/04/03/pegasus-android/"
}
],
"first_seen": null,
"id": "relationship--f5fab17b-43e7-46ff-bdea-eb8c52a0c6c3",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--93799a9d-3537-43d8-b6f4-17215de1657c",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:18.937Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An adversary could seek to generate fraudulent advertising revenue from mobile devices, for example by triggering automatic clicks of advertising links without user involvement.",
"external_references": [
{
"description": null,
"external_id": "T1472",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1472"
}
],
"first_seen": null,
"id": "attack-pattern--f981d199-2720-467e-9dc9-eea04dbe05cf",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "impact"
}
],
"last_seen": null,
"modified": "2022-04-06T13:57:49.177Z",
"name": "Generate Fraudulent Advertising Revenue",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": true,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": false,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-03T15:42:28.475Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AbstractEmu](https://attack.mitre.org/software/S1061) can send large amounts of device data over its C2 channel, including the device’s manufacturer, model, version and serial number, telephone number, and IP address.(Citation: lookout_abstractemu_1021)",
"external_references": [
{
"description": "P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023.",
"external_id": null,
"source_name": "lookout_abstractemu_1021",
"url": "https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign"
}
],
"first_seen": null,
"id": "relationship--6bb4de7d-1ef9-4bc8-8d34-62e176d4188a",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-03-27T17:17:24.417Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--2aec175b-4429-4048-8e09-3ef6cbecfc64",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-15T17:20:06.338Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Bread](https://attack.mitre.org/software/S0432) uses various tricks to obfuscate its strings including standard and custom encryption, programmatically building strings at runtime, and splitting unencrypted strings with repeated delimiters to break up keywords. [Bread](https://attack.mitre.org/software/S0432) has also abused Java and JavaScript features to obfuscate code. [Bread](https://attack.mitre.org/software/S0432) payloads have hidden code in native libraries and encrypted JAR files in the data section of an ELF file. [Bread](https://attack.mitre.org/software/S0432) has stored DEX payloads as base64-encoded strings in the Android manifest and internal Java classes.(Citation: Check Point-Joker)(Citation: Google Bread)",
"external_references": [
{
"description": "A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020.",
"external_id": null,
"source_name": "Google Bread",
"url": "https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html"
},
{
"description": "Hazum, A., Melnykov, B., Wernik, I.. (2020, July 9). New Joker variant hits Google Play with an old trick. Retrieved July 20, 2020.",
"external_id": null,
"source_name": "Check Point-Joker",
"url": "https://research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/"
}
],
"first_seen": null,
"id": "relationship--29357289-362c-447c-b387-9a38b50d7296",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-15T17:20:06.338Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--108b2817-bc01-404e-8e1b-8cdeec846326",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-08T15:41:19.355Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Anubis](https://attack.mitre.org/software/S0422) was distributed via phishing link in an email.(Citation: Cofense Anubis)",
"external_references": [
{
"description": "M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020.",
"external_id": null,
"source_name": "Cofense Anubis",
"url": "https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/"
}
],
"first_seen": null,
"id": "relationship--c200184f-3d11-452c-8362-bb66337df1f5",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-05-04T14:04:56.211Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Bread](https://attack.mitre.org/software/S0432) communicates with the C2 server using HTTP requests.(Citation: Google Bread)",
"external_references": [
{
"description": "A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020.",
"external_id": null,
"source_name": "Google Bread",
"url": "https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html"
}
],
"first_seen": null,
"id": "relationship--9cfcda7d-bb82-4122-a38b-fec4f5532856",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:03:51.504Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--108b2817-bc01-404e-8e1b-8cdeec846326",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:47:08.535Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[S.O.V.A.](https://attack.mitre.org/software/S1062) has code to encrypt device data with AES.(Citation: cleafy_sova_1122)",
"external_references": [
{
"description": "Francesco Lubatti, Federico Valentini. (2022, November 8). SOVA malware is back and is evolving rapidly. Retrieved March 30, 2023.",
"external_id": null,
"source_name": "cleafy_sova_1122",
"url": "https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly"
}
],
"first_seen": null,
"id": "relationship--8d71e646-74d1-4d62-8989-2ad4ddf7a67b",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-03-30T15:13:44.210Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--4b53eb01-57d7-47b4-b078-22766b002b36",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-06-09T19:19:56.840Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Hornbill](https://attack.mitre.org/software/S1077) has monitored for SMS and WhatsApp notifications.(Citation: lookout_hornbill_sunbird_0221)",
"external_references": [
{
"description": "Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023.",
"external_id": null,
"source_name": "lookout_hornbill_sunbird_0221",
"url": "https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict"
}
],
"first_seen": null,
"id": "relationship--7c4a4766-cb63-4a3c-85ef-a1dba3be4a47",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-06-09T19:19:56.840Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T19:51:08.770Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "The `HIDE_OVERLAY_WINDOWS` permission was introduced in Android 12 allowing apps to hide overlay windows of type `TYPE_APPLICATION_OVERLAY` drawn by other apps with the `SYSTEM_ALERT_WINDOW` permission, preventing other applications from creating overlay windows on top of the current application.(Citation: Android 12 Features)",
"external_references": [
{
"description": "Google. (2022, April 4). Features and APIs Overview. Retrieved April 5, 2022.",
"external_id": null,
"source_name": "Android 12 Features",
"url": "https://developer.android.com/about/versions/12/features"
}
],
"first_seen": null,
"id": "relationship--1f44936e-b84c-404f-a92e-6fb7e24b5435",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-05T19:51:08.770Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T15:50:18.937Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Ginp](https://attack.mitre.org/software/S0423) can send SMS messages.(Citation: ThreatFabric Ginp)",
"external_references": [
{
"description": "ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020.",
"external_id": null,
"source_name": "ThreatFabric Ginp",
"url": "https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html"
}
],
"first_seen": null,
"id": "relationship--eb1eeb37-37a8-47b6-aff8-9703735a4d93",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-09-11T15:50:18.937Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--6146be90-470c-4049-bb3a-9986b8ffb65b",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-28T17:19:51.110Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Escobar](https://attack.mitre.org/software/S1092) can access the device’s call log.(Citation: Bleeipng Computer Escobar)",
"external_references": [
{
"description": "B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023.",
"external_id": null,
"source_name": "Bleeipng Computer Escobar",
"url": "https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/"
}
],
"first_seen": null,
"id": "relationship--befa3b5a-e4f4-4ed3-ada1-860a034284d2",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-28T17:19:51.110Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.2.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T19:49:59.027Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--8650e2e8-d8bd-472d-8b9b-54befbea05b8",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-05T19:49:59.027Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "subtechnique-of",
"revoked": false,
"source_ref": "attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-06-09T19:11:38.612Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Hornbill](https://attack.mitre.org/software/S1077) can access a device’s location and check if GPS is enabled. [Hornbill](https://attack.mitre.org/software/S1077) has logic to only log location changes greater than 70 meters.(Citation: lookout_hornbill_sunbird_0221)",
"external_references": [
{
"description": "Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023.",
"external_id": null,
"source_name": "lookout_hornbill_sunbird_0221",
"url": "https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict"
}
],
"first_seen": null,
"id": "relationship--6ad4f199-99fe-4366-87be-7a462f6c89b0",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-22T20:48:41.487Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-06-09T19:10:48.877Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Hornbill](https://attack.mitre.org/software/S1077) can collect the device ID, model, manufacturer, and Android version. It can also check available storage space and if the screen is locked.(Citation: lookout_hornbill_sunbird_0221)",
"external_references": [
{
"description": "Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023.",
"external_id": null,
"source_name": "lookout_hornbill_sunbird_0221",
"url": "https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict"
}
],
"first_seen": null,
"id": "relationship--54bfecbc-4d1d-4bca-bb9c-652d09b29515",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-04T19:14:31.727Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T14:50:57.491Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Security updates often contain patches for vulnerabilities.",
"external_references": null,
"first_seen": null,
"id": "relationship--13518e48-bb32-4ee3-9cd0-e5f367a2fb2d",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-03-30T15:52:58.256Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:38:45.607Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[S.O.V.A.](https://attack.mitre.org/software/S1062) can use keylogging to capture user input.(Citation: threatfabric_sova_0921)",
"external_references": [
{
"description": "ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023.",
"external_id": null,
"source_name": "threatfabric_sova_0921",
"url": "https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html"
}
],
"first_seen": null,
"id": "relationship--520c7112-9768-42c5-8917-1950efd182f9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-03-29T21:33:30.155Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--4b53eb01-57d7-47b4-b078-22766b002b36",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-28T17:21:26.448Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Escobar](https://attack.mitre.org/software/S1092) can use VNC to remotely control an infected device.(Citation: Bleeipng Computer Escobar)",
"external_references": [
{
"description": "B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023.",
"external_id": null,
"source_name": "Bleeipng Computer Escobar",
"url": "https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/"
}
],
"first_seen": null,
"id": "relationship--cf2cfc6e-896a-4c99-b286-41f8dbd6fa4c",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-09-28T17:21:26.448Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.2.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-02-08T16:36:20.630Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Windshift](https://attack.mitre.org/groups/G0112) has deployed anti-analysis capabilities during their Operation BULL campaign.(Citation: BlackBerry Bahamut)",
"external_references": [
{
"description": "The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021.",
"external_id": null,
"source_name": "BlackBerry Bahamut",
"url": "https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf"
}
],
"first_seen": null,
"id": "relationship--2e7f8995-93ae-41bb-9baf-53178341d93e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T17:06:00.885Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T20:14:17.442Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--59e225fa-b181-4906-9f0b-ef8f6ce7f2ef",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-05T20:14:17.442Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "subtechnique-of",
"revoked": false,
"source_ref": "attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ed2c05a1-4f81-4d97-9e1b-aff01c34ae84",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-14T14:52:03.103Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Red Alert 2.0](https://attack.mitre.org/software/S0539) has been distributed via webpages designed to look like the Play Store.(Citation: Sophos Red Alert 2.0)",
"external_references": [
{
"description": "J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020.",
"external_id": null,
"source_name": "Sophos Red Alert 2.0",
"url": "https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/"
}
],
"first_seen": null,
"id": "relationship--7ba3b225-5446-4e9d-886b-1eb5c503e77a",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--6e282bbf-5f32-476a-b879-ba77eec463c8",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-20T13:58:53.604Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[XLoader for iOS](https://attack.mitre.org/software/S0490) can obtain the device’s IMEM, ICCID, and MEID.(Citation: TrendMicro-XLoader-FakeSpy)",
"external_references": [
{
"description": "Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020.",
"external_id": null,
"source_name": "TrendMicro-XLoader-FakeSpy",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/"
}
],
"first_seen": null,
"id": "relationship--3f81a680-3151-4608-b83f-550756632013",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-09-24T15:12:24.301Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--29944858-da52-4d3d-b428-f8a6eb8dde6f",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-02T14:32:31.900Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[INSOMNIA](https://attack.mitre.org/software/S0463) grants itself permissions by injecting its hash into the kernel’s trust cache.(Citation: Google Project Zero Insomnia)",
"external_references": [
{
"description": "I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020.",
"external_id": null,
"source_name": "Google Project Zero Insomnia",
"url": "https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html"
}
],
"first_seen": null,
"id": "relationship--269d4409-e287-4ef3-b5f3-765ec03e503e",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T21:18:38.700Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-04T14:28:15.482Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Monokle](https://attack.mitre.org/software/S0407) can reset the user's password/PIN.(Citation: Lookout-Monokle)",
"external_references": [
{
"description": "Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019.",
"external_id": null,
"source_name": "Lookout-Monokle",
"url": "https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf"
}
],
"first_seen": null,
"id": "relationship--545d9313-3fcc-4d4a-b9d2-7555430df8f2",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-04-05T21:28:58.447Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2c2249a-eb82-4614-8dd4-9c514dde65e2",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-16T16:38:47.766Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Chameleon](https://attack.mitre.org/software/S1083) can remove artifacts of its presence and uninstall itself.(Citation: cyble_chameleon_0423)",
"external_references": [
{
"description": "Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023.",
"external_id": null,
"source_name": "cyble_chameleon_0423",
"url": "https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/"
}
],
"first_seen": null,
"id": "relationship--01fd0686-d67f-4396-8812-3533063dd6b4",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-08-16T16:38:47.766Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T20:08:00.704Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Gustuff](https://attack.mitre.org/software/S0406) code is both obfuscated and packed with an FTT packer.(Citation: Talos Gustuff Apr 2019)",
"external_references": [
{
"description": "Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019.",
"external_id": null,
"source_name": "Talos Gustuff Apr 2019",
"url": "https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html"
}
],
"first_seen": null,
"id": "relationship--67c2b73d-cd51-4894-a7bd-fdd5d14b33a2",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-15T17:18:58.074Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--51636761-2e35-44bf-9e56-e337adf97174",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.742Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--51186ad6-e721-49cf-9cf7-89466d5f29f4",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": null,
"source_ref": "course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-28T19:25:17.596Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version.",
"external_references": [
{
"description": null,
"external_id": "T1474.003",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1474/003"
},
{
"description": null,
"external_id": "SPC-4",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-4.html"
},
{
"description": null,
"external_id": "SPC-11",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-11.html"
},
{
"description": null,
"external_id": "SPC-12",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-12.html"
},
{
"description": null,
"external_id": "SPC-18",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-18.html"
},
{
"description": null,
"external_id": "SPC-20",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-20.html"
}
],
"first_seen": null,
"id": "attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc",
"identity_class": null,
"is_family": null,
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "initial-access"
}
],
"last_seen": null,
"modified": "2023-03-20T15:32:37.109Z",
"name": "Compromise Software Supply Chain",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "attack-pattern",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": "Application vetting services can detect malicious code in applications. System partition integrity checking mechanisms can detect unauthorized or malicious code contained in the system partition.",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": true,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_shortname": null,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_version": "1.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-03-11T15:13:40.425Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) gathers the device OS version, device build version, manufacturer, and model.(Citation: TrendMicro-Anserver2)",
"external_references": [
{
"description": "Karl Dominguez. (2011, September 27). ANDROIDOS_ANSERVER.A. Retrieved November 30, 2018.",
"external_id": null,
"source_name": "TrendMicro-Anserver2",
"url": "https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ANDROIDOS_ANSERVER.A"
}
],
"first_seen": null,
"id": "relationship--a82d3cfb-7ef2-4e39-a6e1-3097d7b106f7",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-03-31T14:49:39.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--4bf6ba32-4165-42c1-b911-9c36165891c8",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-07-21T19:53:59.148Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Fakecalls](https://attack.mitre.org/software/S1080) can send exfiltrated data back to the C2 server.(Citation: kaspersky_fakecalls_0422)",
"external_references": [
{
"description": "Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023.",
"external_id": null,
"source_name": "kaspersky_fakecalls_0422",
"url": "https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/"
}
],
"first_seen": null,
"id": "relationship--b6323cf4-8141-4910-8743-e42cd15b49e9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2023-07-21T19:53:59.148Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": false,
"source_ref": "malware--429e1526-6293-495b-8808-af7f9a66c4be",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T18:43:15.716Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Mobile security software can typically detect if a device has been rooted or jailbroken and can inform the user, who can then take appropriate action.",
"external_references": null,
"first_seen": null,
"id": "relationship--825ffecc-090f-44c8-87be-f7b72e07f987",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-01T18:43:15.716Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "mitigates",
"revoked": false,
"source_ref": "course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": false,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "0.1"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-14T15:32:11.804Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SimBad](https://attack.mitre.org/software/S0419) was embedded into legitimate applications.(Citation: CheckPoint SimBad 2019)",
"external_references": [
{
"description": "Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019.",
"external_id": null,
"source_name": "CheckPoint SimBad 2019",
"url": "https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/"
}
],
"first_seen": null,
"id": "relationship--9c834f8f-390e-4c60-b0be-9bdd8d9815c9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-07-07T14:00:00.188Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--f79c01eb-2954-40d8-a819-00b342f47ce7",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T14:54:16.566Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Desert Scorpion](https://attack.mitre.org/software/S0505) can collect device metadata and can check if the device is rooted.(Citation: Lookout Desert Scorpion)",
"external_references": [
{
"description": "A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020.",
"external_id": null,
"source_name": "Lookout Desert Scorpion",
"url": "https://blog.lookout.com/desert-scorpion-google-play"
}
],
"first_seen": null,
"id": "relationship--6de29595-e63e-4d7e-992f-b4622b7b8e23",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-09-11T14:54:16.566Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--3271c107-92c4-442e-9506-e76d62230ee8",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-24T17:55:12.900Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GPlayed](https://attack.mitre.org/software/S0536) can collect the device’s IMEI, phone number, and country.(Citation: Talos GPlayed)",
"external_references": [
{
"description": "V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020.",
"external_id": null,
"source_name": "Talos GPlayed",
"url": "https://blog.talosintelligence.com/2018/10/gplayedtrojan.html"
}
],
"first_seen": null,
"id": "relationship--58c0fe4b-612d-4fc6-973f-16914b0f4b72",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2020-11-24T17:55:12.900Z",
"name": null,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": "uses",
"revoked": null,
"source_ref": "malware--a993495c-9813-4372-b9ec-d168c7f7ec0a",
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": "attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd",
"type": "relationship",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": null,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:51.365Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Warn device users not to accept requests to grant Device Administrator access to applications without good reason.\n\nAdditionally, application vetting should include a check on whether the application requests Device Administrator access. Applications that do request Device Administrator access should be carefully scrutinized and only allowed to be used if a valid reason exists.",
"external_references": [
{
"description": null,
"external_id": "M1007",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/mitigations/M1007"
}
],
"first_seen": null,
"id": "course-of-action--e944670c-d03a-4e93-a21c-b3d4c53ec4c9",
"identity_class": null,
"is_family": null,
"kill_chain_phases": null,
"last_seen": null,
"modified": "2022-04-06T14:47:19.714Z",
"name": "Caution with Device Administrator Access",
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"relationship_type": null,
"revoked": false,
"source_ref": null,
"spec_version": "2.1",
"tactic_refs": null,
"target_ref": null,
"type": "course-of-action",
"x_mitre_aliases": null,
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_collection_layers": null,
"x_mitre_contents": null,
"x_mitre_contributors": null,
"x_mitre_data_source_ref": null,
"x_mitre_deprecated": true,
"x_mitre_detection": null,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_first_seen_citation": null,
"x_mitre_is_subtechnique": null,
"x_mitre_last_seen_citation": null,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_old_attack_id": null,
"x_mitre_platforms": null,
"x_mitre_shortname": null,
"x_mitre_tactic_type": null,
"x_mitre_version": "1.0"
} |