67 lines
3.5 KiB
JSON
67 lines
3.5 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--b9e19776-6c81-4d1f-b6fe-2f0fa9c13ac9",
|
|
"spec_version": "2.0",
|
|
"objects": [
|
|
{
|
|
"type": "x-mitre-analytic",
|
|
"id": "x-mitre-analytic--dd1b3351-f8e5-480e-9e7d-f9cfbbf01409",
|
|
"created": "2025-10-21T15:10:28.402Z",
|
|
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
|
|
"revoked": false,
|
|
"external_references": [
|
|
{
|
|
"source_name": "mitre-attack",
|
|
"url": "https://attack.mitre.org/detectionstrategies/DET0719#AN1850",
|
|
"external_id": "AN1850"
|
|
}
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
|
|
],
|
|
"modified": "2026-04-09T19:56:13.060Z",
|
|
"name": "Analytic 1850",
|
|
"description": "Correlates (1) device posture changes indicating root or elevated privilege state, (2) runtime framework manipulation or injection into application processes, and (3) anomalous API behavior or suppressed security signals. The defender observes a causal chain where an application gains privileged execution context, interacts with system frameworks (e.g., ART/Zygote), and modifies expected API outputs or suppresses security-relevant signals such as permission checks, sensor access reporting, or process visibility.",
|
|
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
|
|
"x_mitre_deprecated": false,
|
|
"x_mitre_version": "1.1",
|
|
"x_mitre_attack_spec_version": "3.3.0",
|
|
"x_mitre_domains": [
|
|
"mobile-attack"
|
|
],
|
|
"x_mitre_platforms": [
|
|
"Android"
|
|
],
|
|
"x_mitre_log_source_references": [
|
|
{
|
|
"x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
|
|
"name": "android:MDMLog",
|
|
"channel": "device transitions to non-compliant state + root detected or integrity attestation failure (SafetyNet/Play Integrity)"
|
|
},
|
|
{
|
|
"x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
|
|
"name": "MobileEDR:telemetry",
|
|
"channel": "application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior"
|
|
}
|
|
],
|
|
"x_mitre_mutable_elements": [
|
|
{
|
|
"field": "TimeWindow",
|
|
"description": "Defines correlation window between root detection, runtime manipulation, and anomalous API behavior"
|
|
},
|
|
{
|
|
"field": "AllowedAppList",
|
|
"description": "Baseline of known applications that legitimately use instrumentation or debugging frameworks"
|
|
},
|
|
{
|
|
"field": "ForegroundStateRequired",
|
|
"description": "Determines whether suspicious API manipulation must occur in background to increase fidelity"
|
|
},
|
|
{
|
|
"field": "IntegritySignalSource",
|
|
"description": "Defines which attestation signals (Play Integrity, OEM attestation) are trusted in the environment"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
} |