Application Permission

Represents the permissions, entitlements, or capability grants associated with a mobile application, including both permissions declared by the application and those granted or requested during runtime.

Monitoring permission state helps defenders identify applications attempting to access protected device resources such as sensors, storage, communications interfaces, or system services.

Examples include:

Android

  • Permissions declared in AndroidManifest.xml
  • Runtime permission prompts
  • Special access privileges (AccessibilityService, overlay, device admin)

iOS

  • App entitlements in provisioning profiles
  • Privacy permission prompts
  • Capability grants for device services
ID: DC0114
Domains: Mobile
Version: 2.1
Created: 13 March 2023
Last Modified: 23 April 2026

Log Sources

Name Channel
android:logcat READ_EXTERNAL_STORAGE / MANAGE_EXTERNAL_STORAGE permission present or toggled at runtime
android:MDMLog Application granted or retaining RECORD_AUDIO permission or privileged CAPTURE_AUDIO_OUTPUT capability
android:MDMLog Application granted/retaining ACCESS_FINE_LOCATION and/or ACCESS_COARSE_LOCATION; background location capability present (ACCESS_BACKGROUND_LOCATION on Android 10+)
android:MDMLog Device inventory changes involving phone number/line identifier fields (when available), eSIM profile presence, or compliance signal indicating SIM profile change
android:MDMLog New permission prompt, package install attempt, accessibility/overlay special access request, or other post-browse capability escalation following browser/WebView activity
android:MDMLog ADB_DEBUGGING_ENABLED
android:MDMLog Application gains or is observed with elevated interaction capability such as accessibility, overlay, device admin, notification access, or other authentication-adjacent special access
android:MDMLog Known application or newly updated version declares, gains, or activates expanded storage, sensor, communications, accessibility, or device-management capability inconsistent with prior baseline or app role
android:MDMLog Known application version declares, gains, or first exercises storage, communications, accessibility, advertising, analytics, overlay, or sensor-adjacent capability inconsistent with prior version baseline or business role
android:MDMLog Device enrollment or compliance event shows failed or degraded verified boot, hardware-backed attestation mismatch, patch/build/baseband inconsistency, or unexpected device property drift near first contact
android:MDMLog Managed or trusted app is newly installed or updated and presents changed package identity, signing relationship, version lineage, installer source, or permission posture inconsistent with approved baseline
android:MDMLog App communicating with legitimate web-service infrastructure is unmanaged, newly installed, recently updated, outside approved app list, or shows baseline drift in role, installer source, or expected capability profile
android:MDMLog App initiating resolver→pivot sequence was unmanaged or not authorized to communicate with detected web-service class or external infrastructure
android:MDMLog App identity performing bidirectional exchange was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for read/write operations
android:MDMLog App identity performing repeated one-way retrieval was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for background content retrieval
android:MDMLog App identity performing camera session was unmanaged, recently granted camera permission, or not approved to use camera for video or interval image capture
android:MDMLog Application granted or retaining the READ_CALL_LOG permission.
android:MDMLog Application granted or retaining the READ_CONTACTS permission.
android:MDMLog Application granted or retaining the READ_SMS or RECEIVE_SMS permission.
android:MDMLog App identity performing screen capture had unapproved accessibility posture, capture-related special access, unmanaged state, or was not approved for screen recording or assistive observation workflows
android:MDMLog NotificationListenerService enabled OR notification access granted to app not in enterprise-approved list
android:MDMLog App not in enterprise-approved list performing network + crypto behavior inconsistent with declared functionality
android:MDMLog App not in approved cryptographic or secure communication category performing keypair + encryption + transmission behavior
android:MDMLog Managed app with undeclared secure transport behavior or app category mismatch initiates opaque TLS communications inconsistent with enterprise policy baseline
android:MDMLog Managed application with no declared backup, sync, export, or media-editing role performs bulk local packaging or encrypted archive generation
android:MDMLog Managed app granted or retaining storage-related or elevated access inconsistent with declared function prior to local data access activity
android:MDMLog Managed app without approved content-download, update, browser, or file-sync role performs remote payload retrieval and local tool staging
android:MDMLog Managed application without approved native-code role or expected high-performance/native dependency exhibits native execution behavior inconsistent with enterprise policy baseline
android:MDMLog Managed application package version, signer lineage, installer source, or app identity changes outside approved enterprise or store-mediated update workflow
android:MDMLog Managed app granted SEND_SMS or RECEIVE_SMS permission, or app role/policy indicates SMS-capable behavior inconsistent with approved enterprise function before SMS control activity
android:MDMLog Default SMS handler changes to non-baselined application or managed app unexpectedly becomes or remains device default SMS app during SMS control phase
android:MDMLog Managed app without approved VPN, enterprise tunneling, browser, or remote-access role exhibits proxy-like traffic handling inconsistent with policy baseline
android:MDMLog Managed app granted call-control-relevant permissions or telecom role state inconsistent with approved enterprise function before call-control activity
android:MDMLog Default phone or telecom-handling role changes to non-baselined application or managed app unexpectedly becomes dialer/call-handling app during call-control phase
android:MDMLog device transitions to non-compliant state + root detected or integrity attestation failure (SafetyNet/Play Integrity)
android:MDMLog application integrity mismatch or package signature inconsistency relative to expected deployment baseline
android:MDMLog application granted high-risk permission or special access (AccessibilityService, SYSTEM_ALERT_WINDOW, DeviceAdmin) with abnormal grant pattern (e.g., no recent user interaction or rapid sequence of grants)
android:MDMLog application granted Device Administrator privilege + abnormal activation pattern (e.g., rapid enablement after install or no recent user interaction)
android:MDMLog application holds permissions enabling environment validation (e.g., location, phone state, nearby device/network context) and subsequently delays protected activity until qualifying values are present
android:MDMLog application granted ACCESS_FINE_LOCATION and, when required for background operation, ACCESS_BACKGROUND_LOCATION + capability state sufficient for persistent geolocation monitoring before later guarded activity
android:MDMLog managed app inventory or launcher-visible state changes show application remains installed but user-facing entry point or launcher component becomes disabled before later runtime activity
android:MDMLog installed application remains present while launcher-visible activity or component discoverability changes to hidden, disabled, or synthesized-settings-entry state prior to later runtime activity
android:MDMLog change to security-relevant device configuration or managed policy (e.g., accessibility enablement, app admin changes, security service state change) preceding telemetry degradation
android:MDMLog application enabled as device administrator, device owner, profile owner, or equivalent elevated management role before uninstall attempt
android:MDMLog application granted accessibility service privileges capable of screen observation or global action invocation before removal attempt
android:MDMLog application enabled as device administrator, device owner, or profile owner before screen-lock or password-control activity
android:MDMLog application granted accessibility service privileges capable of intercepting UI flow or sustaining user-interaction denial before lockout event
android:MDMLog device posture changes to rooted, non-compliant, weakened security state, or elevated control role becomes active before security-tool degradation
android:MDMLog security-relevant application package state, enabled status, administrator state, or managed protection setting changes immediately before monitoring degradation
android:MDMLog device posture or compromise-state indicators change unexpectedly, including rooted or non-compliant status disappearance, after prior app or system activity suggesting persistence on device
android:MDMLog managed application state changes unexpectedly through uninstall, disappearance from expected inventory, or install-state mismatch after prior suspicious activity
android:MDMLog application holds device-owner, profile-owner, or delegated app-management authority capable of package removal before uninstall event
android:MDMLog application has accessibility service privileges immediately before package-removal UI flow and subsequent application disappearance
android:MDMLog device posture indicates rooted, compromised, or non-compliant state before package files disappear without standard managed uninstall workflow
android:MDMLog application holds device administrator, device owner, or other managed authority capable of wipe or destructive device-level action before bulk file loss or wipe event
android:MDMLog device posture indicates rooted, compromised, or non-compliant state before protected or atypical filesystem deletion activity
android:MDMLog Application granted or retaining the READ_CALENDAR or WRITE_CALENDAR permissions.
Application Vetting None
iOS:MDMLog Application installed with NSMicrophoneUsageDescription entitlement indicating microphone capability
iOS:MDMLog App installed with location usage declarations (WhenInUse/Always usage description) and granted authorization level via managed policy state
iOS:MDMLog Managed device inventory change indicating cellular plan/eSIM profile updates (where available via supervised iOS + MDM reporting)
iOS:MDMLog Post-browse configuration profile prompt, managed/unmanaged app handoff anomaly, or compliance-relevant state change shortly after browser activity
iOS:MDMLog Compliance posture or restriction state relevant to accessory access, USB restricted mode, supervised trust policy, or backup/pairing restrictions
iOS:MDMLog Known application version declares, activates, or exhibits new entitlements, privacy permissions, or capability use inconsistent with prior baseline or business role
iOS:MDMLog Supervised enrollment, activation, or inventory event reveals unexpected device property relationships, anomalous managed posture, unexplained configuration drift near first contact, or identity/inventory characteristics inconsistent with approved procurement baseline
iOS:MDMLog Supervised managed app is newly installed or updated and presents unexpected version transition, inventory drift, managed-state change, or app attribute mismatch against approved procurement and release baseline
iOS:MDMLog Managed app communicating with legitimate web-service infrastructure is newly installed, recently updated, outside expected managed-app set, or displays baseline drift in app role, release path, or business justification
iOS:MDMLog Bundle performing resolver→pivot sequence not present in approved managed-app baseline or lacks expected service relationship
iOS:MDMLog Bundle performing bidirectional exchange was not present in approved managed-app baseline or was not permitted to use detected public web-service class for read/write operations
iOS:MDMLog Bundle performing repeated one-way retrieval was not present in approved managed-app baseline or was not permitted to use detected public web-service class for background content retrieval
iOS:MDMLog App identity using non-standard protocol-to-port pairing was unmanaged, outside approved app baseline, or not permitted to communicate using detected protocol/service over observed destination port
iOS:MDMLog Bundle performing camera session was not present in approved managed-app baseline or was not permitted to use camera for video or interval image capture
iOS:MDMLog Supervised managed app with undeclared secure transport behavior or unexpected network role communicates with non-baselined destination over opaque TLS
iOS:MDMLog Supervised managed app without expected export, backup, or sync role performs local data staging behavior followed by opaque upload activity
iOS:MDMLog Supervised managed app without expected local export, sync, or forensic role accesses or stages local records inconsistent with policy baseline
iOS:MDMLog Supervised managed app without approved update, browser, sync, or enterprise-content role retrieves and stages secondary content inconsistent with policy baseline
iOS:MDMLog application has approved capabilities required for conditional execution (e.g., location/background modes) but observed behavior is deferred until target-specific state is present
iOS:MDMLog application authorized for when-in-use or always location access and, where relevant, background execution capability sufficient for continued geographic evaluation before later guarded behavior
MobileEDR:telemetry App with network-, telephony-, Wi-Fi-, or location-adjacent capability is impacted by abrupt repeated service loss while permissions remain unchanged
MobileEDR:telemetry Network- or location-dependent app capability state remains unchanged while the app experiences sustained communication failure
MobileEDR:telemetry Application holds or is granted broad storage, document-provider, media, or file-management capability inconsistent with its expected role before or during bulk file transformation

Detection Strategy

ID Name Technique Detected
DET0642 Detection of Abuse Elevation Control Mechanism T1626
DET0611 Detection of Access Notifications T1517
DET0605 Detection of Account Access Removal T1640
DET0635 Detection of Accounts T1636.005
DET0652 Detection of Application Versioning T1661
DET0670 Detection of Archive Collected Data T1532
DET0667 Detection of Asymmetric Cryptography T1521.002
DET0673 Detection of Audio Capture T1429
DET0700 Detection of Bidirectional Communication T1481.002
DET0674 Detection of Calendar Entries T1636.001
DET0703 Detection of Call Control T1616
DET0602 Detection of Call Log T1636.002
DET0649 Detection of Compromise Application Executable T1577
DET0604 Detection of Compromise Hardware Supply Chain T1474.002
DET0704 Detection of Compromise Software Dependencies and Development Tools T1474.001
DET0721 Detection of Compromise Software Supply Chain T1474.003
DET0679 Detection of Contact List T1636.003
DET0671 Detection of Data Destruction T1662
DET0678 Detection of Data Encrypted for Impact T1471
DET0713 Detection of Data from Local System T1533
DET0617 Detection of Dead Drop Resolver T1481.001
DET0630 Detection of Device Administrator Permissions T1626.001
DET0603 Detection of Device Lockout T1629.002
DET0693 Detection of Disable or Modify Tools T1629.003
DET0614 Detection of Drive-By Compromise T1456
DET0641 Detection of Encrypted Channel T1521
DET0627 Detection of Endpoint Denial of Service T1642
DET0653 Detection of Execution Guardrails T1627
DET0682 Detection of File and Directory Discovery T1420
DET0638 Detection of File Deletion T1630.002
DET0608 Detection of Generate Traffic from Victim T1643
DET0648 Detection of Geofencing T1627.001
DET0640 Detection of Hide Artifacts T1628
DET0719 Detection of Hooking T1617
DET0687 Detection of Impair Defenses T1629
DET0651 Detection of Indicator Removal on Host T1630
DET0718 Detection of Ingress Tool Transfer T1544
DET0708 Detection of Internet Connection Discovery T1422.001
DET0675 Detection of Location Tracking T1430
DET0645 Detection of Lockscreen Bypass T1461
DET0717 Detection of Native API T1575
DET0639 Detection of Network Denial of Service T1464
DET0706 Detection of Non-Standard Port T1509
DET0610 Detection of One-Way Communication T1481.003
DET0598 Detection of Prevent Application Removal T1629.001
DET0681 Detection of Protected User Data T1636
DET0631 Detection of Proxy Through Victim T1604
DET0691 Detection of Replication Through Removable Media T1458
DET0668 Detection of Screen Capture T1513
DET0658 Detection of SIM Card Swap T1451
DET0599 Detection of SMS Control T1582
DET0686 Detection of SMS Messages T1636.004
DET0646 Detection of SSL Pinning T1521.003
DET0628 Detection of Supply Chain Compromise T1474
DET0714 Detection of Suppress Application Icon T1628.001
DET0650 Detection of Symmetric Cryptography T1521.001
DET0634 Detection of System Network Configuration Discovery T1422
DET0690 Detection of Uninstall Malicious Application T1630.001
DET0695 Detection of Video Capture T1512
DET0606 Detection of Virtualization Solution T1670
DET0672 Detection of Web Service T1481
DET0709 Detection of Wi-Fi Discovery T1422.002