Files
cti/mobile-attack/x-mitre-analytic/x-mitre-analytic--1a27d3ed-86e8-4389-927d-1d43d94dc719.json
2026-04-27 15:19:48 -04:00

48 lines
2.1 KiB
JSON

{
"type": "bundle",
"id": "bundle--ab2dc9fe-5273-4de2-adb5-e1ef14fbe5bb",
"spec_version": "2.0",
"objects": [
{
"type": "x-mitre-analytic",
"id": "x-mitre-analytic--1a27d3ed-86e8-4389-927d-1d43d94dc719",
"created": "2025-10-21T15:10:28.402Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/detectionstrategies/DET0633#AN1705",
"external_id": "AN1705"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"modified": "2025-10-21T15:10:28.402Z",
"name": "Analytic 1705",
"description": "Application vetting services may be able to detect known privilege escalation exploits contained within applications, as well as searching application packages for strings that correlate to known password store locations.\nMobile security products can potentially detect jailbroken devices.",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "3.3.0",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_platforms": [
"iOS"
],
"x_mitre_log_source_references": [
{
"x_mitre_data_component_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
"name": "Application Vetting",
"channel": "None"
},
{
"x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
"name": "Sensor Health",
"channel": "None"
}
],
"x_mitre_deprecated": false
}
]
}