Files
cti/mobile-attack/attack-pattern/attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44.json
T
Isabel Tuson a33e30b57d ATT&CK v7.1
2020-07-13 09:47:00 -04:00

47 lines
2.2 KiB
JSON

{
"type": "bundle",
"id": "bundle--7151224d-c5e8-4bca-8fec-319b47598531",
"spec_version": "2.0",
"objects": [
{
"id": "attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"name": "Access Call Log",
"description": "On Android, an adversary could call standard operating system APIs from a malicious application to gather call log data, or with escalated privileges could directly access files containing call log data.\n\nOn iOS, applications do not have access to the call log, so privilege escalation would be required in order to access the data.",
"external_references": [
{
"source_name": "mitre-mobile-attack",
"url": "https://attack.mitre.org/techniques/T1433",
"external_id": "T1433"
},
{
"external_id": "APP-13",
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"type": "attack-pattern",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "collection"
}
],
"modified": "2019-09-18T18:17:43.466Z",
"created": "2017-10-25T14:48:11.116Z",
"x_mitre_old_attack_id": "MOB-T1036",
"x_mitre_version": "1.1",
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_detection": "On Android 6.0 and up, the user can view which applications have permission to access call log information through the device settings screen, and the user can choose to revoke the permissions."
}
]
}