Files
cti/mobile-attack/x-mitre-analytic/x-mitre-analytic--7b4c77fd-f350-48ec-abce-aac3e35c939f.json
2026-04-27 15:19:48 -04:00

93 lines
5.1 KiB
JSON

{
"type": "bundle",
"id": "bundle--3cc7ae80-9276-41e6-9a29-0fb817f5a0c5",
"spec_version": "2.0",
"objects": [
{
"type": "x-mitre-analytic",
"id": "x-mitre-analytic--7b4c77fd-f350-48ec-abce-aac3e35c939f",
"created": "2025-10-21T15:10:28.402Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/detectionstrategies/DET0618#AN1677",
"external_id": "AN1677"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"modified": "2026-01-29T17:21:52.654Z",
"name": "Analytic 1677",
"description": "From the defender\u2019s view: an app retrieves opaque code (DEX/SO/JAR/JS) over the network or IPC, writes it into an app-writable path, optionally performs verification-bypass behaviors (reflection, addJavascriptInterface exposure, or execmem friction), and then loads/executes that code via DexClassLoader/PathClassLoader, dlopen, or WebView bridge invocation within a short window. The analytic correlates Network Content \u2192 File Creation/Modification \u2192 OS API Execution (loader/syscall/SELinux friction) \u2192 Module Load (DexClassLoader/dlopen) and, for WebView paths, Application Log signals of JavaScript interface attachment.",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_deprecated": false,
"x_mitre_version": "1.1",
"x_mitre_attack_spec_version": "3.3.0",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_platforms": [
"Android"
],
"x_mitre_log_source_references": [
{
"x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
"name": "NSM:Flow",
"channel": "HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)"
},
{
"x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
"name": "android:logcat",
"channel": "Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy"
},
{
"x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
"name": "android:logcat",
"channel": "SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID"
},
{
"x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
"name": "android:logcat",
"channel": "DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so"
}
],
"x_mitre_mutable_elements": [
{
"field": "TimeWindowSeconds",
"description": "Max correlation window between download \u2192 write \u2192 load (e.g., 10\u201360s depending on device/workload)."
},
{
"field": "ContentTypeList",
"description": "List of MIME types considered \u2018code-like\u2019 (octet-stream, zip, java-archive, x-dex, x-sharedlib, javascript)."
},
{
"field": "WritablePathRegex",
"description": "Regex for app-writable destinations to watch (/data/data/<pkg>/(files|cache)/, /storage/emulated/0/...)."
},
{
"field": "PayloadEntropyThreshold",
"description": "Entropy cutoff to flag likely code blobs (e.g., \u2265 7.2)."
},
{
"field": "KnownGoodCDNAllowlist",
"description": "CDNs/domains expected for legitimate updates to reduce FPs."
},
{
"field": "KnownGoodLoaderAllowlist",
"description": "Bundles/libs known to legitimately load from writable paths (dev/test apps)."
},
{
"field": "JSInterfaceNameList",
"description": "Names of allowed WebView JS interfaces for the org (e.g., analytics only)."
},
{
"field": "UserContext",
"description": "Foreground/background, Work Profile, dev mode to scope alerts."
}
]
}
]
}