test_scratch / cti-ATT-CK-v13.1 /mobile-attack /attack-pattern /attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
3.13 kB
{
"type": "bundle",
"id": "bundle--50ec704b-6666-4888-91bb-fc0b35b48313",
"spec_version": "2.0",
"objects": [
{
"modified": "2023-03-16T18:26:46.043Z",
"name": "Boot or Logon Initialization Scripts",
"description": "Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence. Initialization scripts are part of the underlying operating system and are not accessible to the user unless the device has been rooted or jailbroken. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "persistence"
}
],
"x_mitre_deprecated": false,
"x_mitre_detection": "On Android, Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. ",
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_version": "2.1",
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"type": "attack-pattern",
"id": "attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5",
"created": "2017-10-25T14:48:31.294Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1398",
"external_id": "T1398"
},
{
"source_name": "Android-VerifiedBoot",
"description": "Android. (n.d.). Verified Boot. Retrieved December 21, 2016.",
"url": "https://source.android.com/security/verifiedboot/"
},
{
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-26.html",
"external_id": "APP-26"
},
{
"source_name": "NIST Mobile Threat Catalogue",
"url": "https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html",
"external_id": "APP-27"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}