type stringclasses 1
value | id stringclasses 1
value | spec_version float64 2.1 2.1 | objects dict |
|---|---|---|---|
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "The adversary is trying to gather data of interest to their goal.\n\nCollection consists of techniques used to identify a... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-16T16:40:14.482Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Chameleon](https://attack.mitre.org/software/S1083) can gather basic device information such as version, model, root sta... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-26T14:55:13.385Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[EventBot](https://attack.mitre.org/software/S0478) can abuse Android’s accessibility service to record the screen PIN.(C... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-15T20:20:59.375Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Mandrake](https://attack.mitre.org/software/S0485) can abuse device administrator permissions to ensure that it cannot b... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-16T20:16:07.673Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may use built-in command-line interfaces to interact with the device and execute commands. Android provides a... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-06T13:41:17.517Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--c96c3405-1d9b-46e4-8f57-a6c49eb68a31",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Gooligan](https://attack.mitre.org/software/S0290) can install adware to generate revenue.(Citation: Gooligan Citation)"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:45:58.793Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[S.O.V.A.](https://attack.mitre.org/software/S1062) can use the open-source project RetroFit for C2 communication.(Citati... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-03T16:26:20.400Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[YiSpecter](https://attack.mitre.org/software/S0311) has collected information about running processes.(Citation: paloalt... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": [
"APT28",
"IRON TWILIGHT",
"SNAKEMACKEREL",
"Swallowtail",
"Group 74",
"Sednit",
"Sofacy",
"Pawn Storm",
"Fancy Bear",
"STRONTIUM",
"Tsar Team",
"Threat Group-4127",
"TG-4127"
],
"created": "2017-05-31T21:31:48.664Z",
"created_by_ref": "identity-... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.737Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--09fa9342-34cb-4f0d-8cdf-df4d51d0ae12",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.737Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android, applications must request the RECORD_AUDIO permission to access the microphone and the CAMERA permission to a... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-24T17:55:12.830Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GPlayed](https://attack.mitre.org/software/S0536) can read SMS messages.(Citation: Talos GPlayed)",
"external_referenc... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-28T17:19:38.041Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Escobar](https://attack.mitre.org/software/S1092) can read SMS messages on the device.(Citation: Bleeipng Computer Escob... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-10T16:50:39.134Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[CarbonSteal](https://attack.mitre.org/software/S0529) has collected device network information, including 16-bit GSM Cel... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:48:39.857Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android, the user can view and manage which applications have third-party keyboard access through the device settings ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T17:48:27.325Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exobot](https://attack.mitre.org/software/S0522) has used HTTPS for C2 communication.(Citation: Threat Fabric Exobot)",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Charger](https://attack.mitre.org/software/S0323) steals contacts from the victim user's device.(Citation: CheckPoint-Ch... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-01-17T12:56:55.080Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "ATT&CK for Mobile is a matrix of adversary behavior against mobile devices (smartphones and tablets running the Android o... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:11:37.258Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "App vetting procedures can search for apps that use the android.os.Build class, but these procedures could potentially be... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.741Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--6d8ea31a-da35-442a-8e0d-1d0c0dcdf14b",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:42:46.814Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[S.O.V.A.](https://attack.mitre.org/software/S1062) can send SMS messages.(Citation: threatfabric_sova_0921)",
"externa... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-08T15:41:19.321Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Anubis](https://attack.mitre.org/software/S0422) can record phone calls and audio.(Citation: Cofense Anubis)",
"extern... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T20:08:00.241Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Gustuff](https://attack.mitre.org/software/S0406) is mobile malware designed to steal users' banking and virtual currenc... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-20T15:44:57.481Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Golden Cup](https://attack.mitre.org/software/S0535) can collect sent and received SMS messages.(Citation: Symantec Gold... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-27T17:05:58.267Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GolfSpy](https://attack.mitre.org/software/S0421) can track the device’s location.(Citation: Trend Micro Bouncing Golf 2... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:51:48.484Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Users should be warned against granting access to accessibility features, and to carefully scrutinize applications that r... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T15:16:28.177Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their paramete... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T20:08:00.757Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Gustuff](https://attack.mitre.org/software/S0406) gathers the device IMEI to send to the command and control server.(Cit... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": " The adversary is trying to avoid being detected.\n\nDefense evasion consists of techniques an adversary may use to evade... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T19:52:38.539Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Filtering requests by checking request origin information may provide some defense against spurious operators.(Citation: ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T19:20:58.116Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has checked to see how many apps are installed, and sp... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:43:14.051Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "The user can see a list of applications that can use accessibility services in the device settings.",
"external_referen... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:17.886Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An adversary may seek to lock the legitimate user out of the device, for example to inhibit user interaction or to obtain... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-01-05T20:16:20.502Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Tiktok Pro](https://attack.mitre.org/software/S0558) can take screenshots.(Citation: Zscaler TikTok Spyware)",
"extern... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-08-07T15:57:13.412Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Riltok](https://attack.mitre.org/software/S0403) can retrieve a list of installed applications. Installed application na... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-26T15:32:25.043Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Cerberus](https://attack.mitre.org/software/S0480) disables Google Play Protect to prevent its discovery and deletion in... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[RCSAndroid](https://attack.mitre.org/software/S0295) can use SMS for command and control.(Citation: TrendMicro-RCSAndroi... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:11:37.106Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting can check for the string `BIND_DEVICE_ADMIN` in the application’s manifest.",
"external_references"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:23.233Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may move onto devices by exploiting or copying malware to devices connected via USB. In the case of Lateral M... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-04-19T14:29:46.530Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": " [SilkBean](https://attack.mitre.org/software/S0549) can send SMS messages.(Citation: Lookout Uyghur Campaign) ",
"exte... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T19:06:40.361Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--34b6abb0-d199-46bb-af21-b65560e75658",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T17:48:27.175Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exobot](https://attack.mitre.org/software/S0522) can lock the device with a password and permanently disable the screen.... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-24T15:34:51.213Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Dendroid](https://attack.mitre.org/software/S0301) can detect if it is being ran on an emulator.(Citation: Lookout-Dendr... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:06.822Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this t... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:42:18.058Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "The user can view applications with administrator access through the device settings, and may also notice if user data is... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.744Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--96027d55-0bdb-4f5f-a559-66c93eab3a17",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:46:08.304Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Mobile threat defense agents could detect unauthorized operating system modifications by using attestation. ",
"externa... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-07-21T19:38:06.254Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[BOULDSPY](https://attack.mitre.org/software/S1079) can retrieve account information for third party services, such as Go... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T14:54:16.642Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "If running on a Huawei device, [Desert Scorpion](https://attack.mitre.org/software/S0505) adds itself to the protected ap... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T17:14:35.469Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--7b45e72f-5741-4942-aa28-ee7abb6f7046",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:56:20.203Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "The user can view permissions granted to an application in device settings. ",
"external_references": null,
"first_se... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T19:45:48.501Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": " [Exodus](https://attack.mitre.org/software/S0405) Two can record audio from the compromised device's microphone and can ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-18T20:14:47.339Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TERRACOTTA](https://attack.mitre.org/software/S0545) has used timer events in React Native to initiate the foreground se... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-04T18:34:26.118Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate calendar information.(Citation: lookout_hornbill_sunbir... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:51:48.526Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Encourage users to protect their account credentials and to enable available multi-factor authentication options.",
"ex... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T18:44:46.780Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-01-20T16:01:19.488Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Anubis](https://attack.mitre.org/software/S0422) has used motion sensor data to attempt to determine if it is running i... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:47.038Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Adups](https://attack.mitre.org/software/S0309) is software that was pre-installed onto Android devices, including those... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-02T14:32:31.777Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[INSOMNIA](https://attack.mitre.org/software/S0463) exploits a WebKit vulnerability to achieve root access on the device.... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T18:07:07.306Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On iOS, the `allowEnterpriseAppTrust` and `allowEnterpriseAppTrustModification` configuration profile restrictions can be... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-14T14:13:45.283Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[eSurv](https://attack.mitre.org/software/S0507)’s Android version was available in the Google Play Store.(Citation: Look... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Xbot](https://attack.mitre.org/software/S0298) uses phishing pages mimicking Google Play's payment interface as well as ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-14T14:13:45.294Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[eSurv](https://attack.mitre.org/software/S0507)’s Android version is distributed in three stages: the dropper, the secon... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.745Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--08e7c0ad-f2d7-472c-97de-3627ca5d2991",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-05-04T14:04:56.184Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Bread](https://attack.mitre.org/software/S0432) can access SMS messages in order to complete carrier billing fraud.(Cita... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-10-10T15:33:57.641Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[EventBot](https://attack.mitre.org/software/S0478) has used icons from popular applications.(Citation: Cybereason EventB... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-15T15:18:12.459Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FakeSpy](https://attack.mitre.org/software/S0509) can collect device information, including OS version and device model.... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-02-17T20:43:52.420Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FrozenCell](https://attack.mitre.org/software/S0577) has retrieved device images for exfiltration.(Citation: Lookout Fro... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-10T15:22:52.545Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[RCSAndroid](https://attack.mitre.org/software/S0295) can collect passwords for Wi-Fi networks and online accounts, inclu... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[RuMMS](https://attack.mitre.org/software/S0313) gathers the device phone number and IMEI and transmits them to a command... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:52.601Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "A variety of methods exist that can be used to enable enterprises to identify compromised (e.g. rooted/jailbroken) device... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-26T15:32:25.045Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Cerberus](https://attack.mitre.org/software/S0480) can collect SMS messages from a device.(Citation: Threat Fabric Cerbe... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-07-16T14:33:12.085Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Triada](https://attack.mitre.org/software/S0424) utilizes a backdoor in a Play Store app to install additional trojanize... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-28T21:41:47.503Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TangleBot](https://attack.mitre.org/software/S1069) can record video from the device camera.(Citation: cloudmark_tangleb... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-10-10T15:33:59.912Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exobot](https://attack.mitre.org/software/S0522) has used names like WhatsApp and Netflix.(Citation: Threat Fabric Exobo... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-01-18T19:17:07.565Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Drinik](https://attack.mitre.org/software/S1054) can request the `READ_EXTERNAL_STORAGE` and `WRITE_EXTERNAL_STORAGE` An... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-01-18T19:19:58.007Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Drinik](https://attack.mitre.org/software/S1054) can hide its application icon.(Citation: cyble_drinik_1022)",
"extern... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T17:48:27.225Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exobot](https://attack.mitre.org/software/S0522) can obtain the device’s country and carrier name.(Citation: Threat Fabr... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.740Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Encourage users to protect their account credentials and to enable available multi-factor authentication options.",
"ex... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-06T13:34:46.021Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may insert, delete, or alter data in order to manipulate external outcomes or hide activity. By manipulating ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.736Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Decrease likelihood of successful privilege escalation attack.",
"external_references": null,
"first_seen": null,
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-04T18:32:57.089Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Sunbird](https://attack.mitre.org/software/S1082) can record environmental and call audio.(Citation: lookout_hornbill_su... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Xbot](https://attack.mitre.org/software/S0298) can remotely lock infected Android devices and ask for a ransom.(Citation... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.747Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--8f7c14bf-4c0f-4e54-99c2-41b511220b33",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-28T17:19:21.499Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Escobar](https://attack.mitre.org/software/S1092) can request the `GET_ACCOUNTS` permission to get the list of accounts ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:57:17.059Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android, the user can review which applications can use premium SMS features in the \"Special access\" page within app... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T19:45:48.485Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": " [Exodus](https://attack.mitre.org/software/S0405) Two can obtain a list of installed applications.(Citation: SWB Exodus ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-20T13:27:33.509Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[WolfRAT](https://attack.mitre.org/software/S0489) can collect the device’s call log.(Citation: Talos-WolfRAT)",
"exter... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-27T17:05:58.305Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GolfSpy](https://attack.mitre.org/software/S0421) can delete arbitrary files on the device.(Citation: Trend Micro Bounci... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Tangelo](https://attack.mitre.org/software/S0329) contains functionality to gather cellular IDs.(Citation: Lookout-Steal... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SpyNote RAT](https://attack.mitre.org/software/S0305) uses an Android broadcast receiver to automatically start when the... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-04-26T15:33:55.905Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Circles](https://attack.mitre.org/software/S0602) can track the location of mobile devices.(Citation: CitizenLab Circles... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-15T18:12:53.512Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Monokle](https://attack.mitre.org/software/S0407) can install attacker-specified certificates to the device's trusted ce... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-24T17:46:31.691Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TrickMo](https://attack.mitre.org/software/S0427) can collect a list of installed applications.(Citation: SecurityIntell... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-31T18:25:05.164Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has been distributed as updates to legitimate applications. This ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:50.769Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application developers should encrypt all of their application network traffic using the Transport Layer Security (TLS) p... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-28T19:31:51.978Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose o... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T19:45:48.498Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exodus](https://attack.mitre.org/software/S0405) One checks in with the command and control server using HTTP POST reque... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T19:45:03.000Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them.\n... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.