Files
cti/mobile-attack/x-mitre-analytic/x-mitre-analytic--b755f519-cc0c-44a4-865f-fa9ead44590f.json
2026-04-27 15:19:48 -04:00

89 lines
4.5 KiB
JSON

{
"type": "bundle",
"id": "bundle--74a445d8-1ad8-4f32-aaec-ed5ee46cc621",
"spec_version": "2.0",
"objects": [
{
"type": "x-mitre-analytic",
"id": "x-mitre-analytic--b755f519-cc0c-44a4-865f-fa9ead44590f",
"created": "2025-10-21T15:10:28.402Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/detectionstrategies/DET0621#AN1684",
"external_id": "AN1684"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"modified": "2026-01-29T18:00:59.178Z",
"name": "Analytic 1684",
"description": "Defender correlates attempts to access other apps\u2019 data via shared containers (App Groups), Photos/Files providers, pasteboard abuse, or jailbroken cross-container reads, followed by aggregation/packaging and optional exfil/share. Sequence: capability/consent (TCC/entitlements) \u2192 target discovery (AppGroup/Photos/Files enumeration, URL schemes) \u2192 bulk read from shared/foreign container or provider \u2192 package/encode \u2192 exfil/share.",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_deprecated": false,
"x_mitre_version": "1.1",
"x_mitre_attack_spec_version": "3.3.0",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_platforms": [
"iOS"
],
"x_mitre_log_source_references": [
{
"x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
"name": "iOS:unifiedlog",
"channel": "Privacy (TCC) prompts/grants for Photos/Files or access changes indicating new visibility into user/app data"
},
{
"x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
"name": "iOS:unifiedlog",
"channel": "READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle"
},
{
"x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
"name": "iOS:unifiedlog",
"channel": "Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging"
},
{
"x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
"name": "iOS:unifiedlog",
"channel": "CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items"
}
],
"x_mitre_mutable_elements": [
{
"field": "TimeWindowSeconds",
"description": "Correlation window for consent/discovery \u2192 read \u2192 package \u2192 exfil (e.g., 20\u2013180s)."
},
{
"field": "AppGroupAllowlist",
"description": "Allowed App Group IDs for each bundle to reduce FPs."
},
{
"field": "ProviderScope",
"description": "Files/Photos provider collections permitted for the app."
},
{
"field": "MinBytesRead",
"description": "Lower bound on cumulative read size to signal collection vs casual access."
},
{
"field": "ArchiveExtensions",
"description": "Packaging extensions to track when aggregating data."
},
{
"field": "ExfilDomainAllowlist",
"description": "Known-good enterprise domains/CDNs for uploads."
},
{
"field": "UserContext",
"description": "Foreground/background and Work Profile state to scope analytics."
}
]
}
]
}